Topic 1: Problem solving |
---|
Algorithms |
Algorithms |
Decomposition |
Flowcharts |
Pseudocode |
Program Code |
Written Descriptions |
Programming Constructs |
Trace Tables |
Data Structures |
One Dimensional Arrays |
Two Dimensional Arrays |
Dictionaries |
Sets |
Searching & Sorting Algorithms |
Bubble Sort |
Merge Sort |
Linear Search |
Binary Search |
Decomposition and abstraction. |
Introduction to Subprograms |
Recursive Subprograms |
Abstraction in Subprograms |
Topic 2: Programming |
Introduction To Programming Fundamentals |
Variables & Constants in Python |
Sequencing, Selection & Iteration in Python |
Arithmetic Operators in Python |
Relational Operators in Python |
Logical Operators in Python |
Data Types (String, Integer, Float, Boolean) |
1 Dimensional Arrays in Python |
2 Dimensional Arrays in Python |
Strings & String Manipulation in Python |
Error Handling Techniques |
Understanding Error Types in Programming |
Writing Effective Test Plans and Test Data |
Mastering Debugging Techniques in Programming |
Validation Methods |
Introduction to Verification and Validation |
Advanced Data Structures In Programming |
Introduction to Functions and Procedures |
Working with Records in Python |
Topic 3: Data |
Binary & Hexadecimal |
Binary Numbers |
Negative Numbers in Binary |
Hexadecimal |
Binary Addition |
Binary Shifts & Overflow |
Data representation |
Introduction to ASCII & Unicode |
Working with B&W Images |
Exploring Grayscale Images |
Understanding Color Images |
Image Compression Techniques |
Representing Sound in Digital Systems |
Encoding & Compression of Video |
Binary & Denary Prefixes |
Calculating File Sizes |
Encryption |
The Need for Encryption |
Pigpen Cypher |
Caesar Cipher |
Vigenere Cipher |
Rail Fence Cipher |
Modern Encryption |
Topic 4: Computers |
Introduction To Computer Models |
Understanding the Input-Process-Output Model |
Exploring Sequential Models in Computing |
Introduction to Parallel Computing Models |
Overview of Multi-Agent Models in Computing |
Understanding Von Neumann Architecture |
Understanding the Fetch-Execute Cycle in Computing |
Types Of Hardware In Computer Systems |
CPU and Registers |
Main Memory (Primary Storage) |
Secondary Storage |
Input Devices |
Output Devices |
CPU Performance Factors |
Embedded Devices |
Understanding Storage Devices |
Magnetic Storage Devices |
Optical Storage Devices |
Electrical Storage Devices |
Cloud Storage |
Backups |
An Overview Of Software |
BIOS & MBR |
CLI, GUI & WIMP |
Operating Systems |
System / Utility Software |
Application Software |
Modelling Software |
High-Level And Low-Level Languages In Computer Science |
Introduction to High & Low Level Languages |
Understanding Compilers |
Exploring Interpreters |
An Overview of Assemblers & Translators |
Logic In Computing |
Topic 5: Communication and the internet |
5.1 Networks |
Understanding Networks |
Understanding Computer Networks |
Understanding Networks |
Understanding Different Types of Networks and Usage Models |
Understanding Wired and Wireless Connectivity |
Understanding Wired and Wireless Connectivity |
Understanding Network Data Speeds |
Understanding Network Protocols |
Understanding Network Protocols |
Understanding Data Transmission with Layered Protocol Stacks and the TCP/IP Model |
Understanding Packet Transmission and the 4-Layer TCP/IP Model |
Understanding Characteristics of Network Topologies |
Understanding Network Topologies |
Understanding Mobile Communication Standards |
Understanding Mobile Communication Standards |
5.2 Network security |
Network Security and Validation Techniques |
Understanding Security Issues in Cloud Storage |
Understanding Cloud Security Issues |
Understanding Different Forms of Cyber Attack |
Understanding Different Forms of Cyber Attack |
Understanding Vulnerability Identification Methods |
Protecting Software Systems from Cyber Attacks |
5.3 The internet and the world wide web |
Understanding the Internet and its Structure |
Understanding the Internet and its Structure |
Understanding the World Wide Web |
Understanding the World Wide Web |
IP Addressing Standards and Formats |
Understanding IP Addressing Standards |
Understanding Components Used to Access the Internet |
Topic 6: The bigger picture |
6.1 Emerging trends, issues and impact |
Understanding the Environmental Impact of Technology on Society |
Understanding the Ethical Impact of Technology on Society |
The Legal Impact of Technology on Society |
Emerging Trends in Computing Technology |