Unit 1 - Problem Solving & Algorithms |
Subunit 1 - Introduction to Algorithms |
1.1.1. Algorithms |
Algorithm / Sorting / Searching / Divide and conquer / Encryption algorithm / Compression algorithm / Search algorithm / Sort algorithm / Iteration / Pattern recognition / Efficiency / Logical reasoning / |
1.1.2. Decomposition |
Decomposition / Modular programming / Abstraction / Top-down design / Hierarchy / Modularity / Bottom-up Processing / Divide and Conquer / Decentralization / Component / |
1.1.2. Decomposition |
Decomposition / Modular programming / Abstraction / Top-down design / Hierarchy / Modularity / Bottom-up Processing / Divide and Conquer / Decentralization / Component / |
1.1.3. Flowcharts |
Flowchart / Process / Terminal Symbol / Decision Symbol / Process Symbol / Connector Symbol / Flowline / Input Symbol / Output Symbol / Loop Symbol / Iteration / Flowcharting Tool / |
1.1.4. Pseudocode, Program Code & Written Descriptions |
Psuedocode / Pseudocode / Program Code / Syntax / Flowchart / Variable / Control Structure / Loop / Conditional Statement / |
1.1.4. Big O Notation |
Big O notation / Time complexity / Worst-case time complexity / Best-case time complexity / Average-case time complexity / O(1) / O(n) / O(log n) / O(n^2) / space complexity / best case / average case / worst case / |
Subunit 3 - Searching & Sorting Algorithms |
1.3.1. Bubble Sort |
Bubble Sort / Comparison / Efficiency / Iteration / Swapping / In-place Sorting / Time Complexity / Space Complexity / Worst-Case Performance / Best-Case Performance / Average-Case Performance / Optimization / Element / Ascending Order / Descending Order / Stable sorting / |
1.3.3. Binary Search |
Binary Search / Sorted array / Divide and Conquer / Iteration / Search interval / Target element / Mid-point / Index / Comparison / Time complexity / Space complexity / Binary search tree / Balanced binary search tree / Height / Leaf / Node / Traversing / In-order traversal / Pre-order traversal / Post-order traversal / |
1.3.2. Merge Sort |
Merge Sort / Divide and conquer / Recursive / Merge / In-place sorting / Stable sort / Comparisons / Swaps / Time complexity / Best case / Average case / Worst case / Big-O notation / Space complexity / In-place merge sort / Recursion / Merge Function / Comparison-based Sort / In-place Sort / Out-of-place Sort / Linearithmic Time Complexity / Logarithmic Time Complexity / Quadratic Time Complexity / Pseudocode / |
1.3.3. Linear Search |
Sequential Search / Linear Search / List / Index / Search / Unordered / Comparison / Algorithm / Runtime / Complexity / Linear time complexity / Worst-case scenario / Best-case scenario / Average-case scenario / Efficiency / Big O notation / O(n) / Array / Element / Boolean / |
1.3.1. Bubble Sort |
Bubble Sort / Comparison / Efficiency / Iteration / Swapping / In-place Sorting / Time Complexity / Space Complexity / Worst-Case Performance / Best-Case Performance / Average-Case Performance / Optimization / Element / Ascending Order / Descending Order / Stable sorting / |
1.3.3. Linear Search |
Sequential Search / Linear Search / List / Index / Search / Unordered / Comparison / Algorithm / Runtime / Complexity / Linear time complexity / Worst-case scenario / Best-case scenario / Average-case scenario / Efficiency / Big O notation / O(n) / Array / Element / Boolean / |
1.3.3. Binary Search |
Binary Search / Sorted array / Divide and Conquer / Iteration / Search interval / Target element / Mid-point / Index / Comparison / Time complexity / Space complexity / Binary search tree / Balanced binary search tree / Height / Leaf / Node / Traversing / In-order traversal / Pre-order traversal / Post-order traversal / |
1.3.2. Merge Sort |
Merge Sort / Divide and conquer / Recursive / Merge / In-place sorting / Stable sort / Comparisons / Swaps / Time complexity / Best case / Average case / Worst case / Big-O notation / Space complexity / In-place merge sort / Recursion / Merge Function / Comparison-based Sort / In-place Sort / Out-of-place Sort / Linearithmic Time Complexity / Logarithmic Time Complexity / Quadratic Time Complexity / Pseudocode / |
1.3.5. Insertion Sort |
|
Subunit 4 - Decomposition & Abstraction |
1.4.1. Subprograms |
Subprogram / Function / Procedure / Return statement / Call statement / Modularity / Reusability / Maintainability / Abstraction / Testing / Readability / Efficiency / |
1.4.2. Abstraction |
Abstraction / Data abstraction / Abstract data type / Abstraction layer / Procedural abstraction / Class / Object / Encapsulation / Inheritance / Polymorphism / |
Unit 10 - Python Programming Challenges |
Subunit - Beginner's Python Challenges |
10..1. Challenges 1 to 4 - Input & Output |
|
10..2. Challenges 5 to 8 - If Statements |
|
10..3. Challenges 9 to 12 - Simple Data Types |
|
10..4. Challenges 13 - 16 While Loops |
|
10..5. Challenges 17 - 20 For Loops |
|
10..5. Challenges 17 - 20 For Loops |
|
10..6. Challenges 21 to 24 - 1 Dimensional Lists |
|
10..7. Challenges 25 to 28 - 2 Dimensional Lists |
|
Unit 10 - Computer Systems |
Subunit 1 - System Planning & Installation |
10.1.5. Installation Processes |
|
10.1.6. Data Migration Issues |
|
Unit 10 - Living in an Online World |
Subunit 1 - Individuals in an online world |
10.1.2. Data & Online Privacy |
|
Unit 10 - Computer Systems |
Subunit 1 - System Components |
10.1.1. Key Components of a system |
Hardware / Software / Network / Data / Operating System / Database / Server / Cloud Computing / User Interface / People / Procedures / Security / |
10.1.1. Modular Systems |
Flexibility / Scalability / Reusability / Maintainability / Encapsulation / Testing / Collaboration / Fault Isolation / Interoperability / Modifiability / |
Subunit 1 - System Planning & Installation |
10.1.1. Identifying the context |
Context / ICT System / Identifying / Physical environment / Political environment / Cultural environment / Social norms / In scope / Out of scope / Scope creep / Scope statement / Change request / Project constraints / Project objectives / users / stakeholders / end users / customers / clients / managers / shareholders / developers / designers / investors / Existing system / Legacy system / Paper based system / Migration / Digital transformation / Reliability / Accessibility / analog system / obsolete system / Internal constraints / External constraints / Resource constraints / Legal constraints / Market constraints / Technological constraints / Environmental constraints / Social constraints / Political constraints / Economic constraints / |
Unit 10 - Living in an Online World |
Subunit 1 - Individuals in an online world |
10.1.1. Effects on health and well being |
Telemedicine / Health Apps / Online Health Communities / E-learning for Health Professionals / Health Information Systems / Digital Therapeutics / Remote Monitoring / Health Education Online / Digital addiction / Eye strain / Poor posture / Sleep disturbances / Isolation / Cyberbullying / |
Unit 10 - Computer Systems |
Subunit 1 - System Components |
10.1.2. Computer Roles in ICT Systems |
Gateway / Router / Switch / client / server / peer / firewall / proxy / packet filtering / terminal / endpoint / |
Subunit 1 - System Planning & Installation |
10.1.2. Change management |
Change management / Change agent / Change readiness / Change control / Change resistance / Kotter Model / Urgency / Guiding Coalition / Vision / Communication / Empowerment / Short-term Wins / Consolidation / Institutionalization / Resistance / |
10.1.7. Methods of Testing |
Unit Testing / Integration Testing / System Testing / Acceptance Testing / Regression Testing / Black Box Testing / White Box Testing / Test Case / dry run testing / walkthrough testing / alpha testing / beta testing / stub testing / |
10.1.3. Compatibility Issues |
Compatibility Issues / ICT Systems / New ICT Systems / Compatibility / Integration / Conflicts / Software / Hardware / Networks / Upgrades / Interoperability / Legacy Systems / Integration Problems / Software Incompatibility / Hardware Incompatibility / Data Migration Challenges / Upgrading Problems / Testing and Quality Assurance / middleware / compatibility layer / mitigate / API gateway / backward compatibility / Technical Debt / Limited Scalability / Obsolete Hardware / Lack of Support / Compliance Risks / |
10.1.7. Methods of Testing |
Unit Testing / Integration Testing / System Testing / Acceptance Testing / Regression Testing / Black Box Testing / White Box Testing / Test Case / dry run testing / walkthrough testing / alpha testing / beta testing / stub testing / |
10.1.4. Local vs Remote Solutions |
Local System / Remote System / System Access / Latency / Bandwidth / Data Security / Data Privacy / Network Infrastructure / Scalability / Reliability / security / compliance / data sovereignty / confidentiality / availability / risk management / audit trail / Upfront cost / Operating cost / Capital expenditure / Operating expenditure / Total cost of ownership / Return on investment / Cost-benefit analysis / Depreciation / Lifecycle cost / Sunk cost / business continuity / disaster recovery / risk assessment / business impact analysis / emergency response plan / incident management / crisis communication / business resilience / Software as a Service / Cloud computing / Subscription-based model / On-demand software / Virtualization / Vendor lock-in / |
10.1.8. Choosing Test Data |
Random sampling / Real-world data / Negative testing / Positive testing / Data completeness / Test Data / Boundary Values / Code Coverage / Ad-Hoc Testing / Pairwise Testing / Usability Testing / Test Coverage / |
10.1.9. System updates and maintenance |
Rolling release / Nightly build / Stable build / Hard release / Soft release / Incremental release / Continuous deployment / Alpha release / Beta release / Patch release / Build / Software release / Update / Source code / maintenance update / bug / performance improvement / new feature / patch / release notes / compatibility / rollback / system downtime / software update / Security Patch / Vulnerability / Zero-day Vulnerability / Exploit / Mitigation / |
10.1.6. Methods of Deployment |
Parallel running / Pilot running / Direct changeover / Phased conversion / System implementation / Transition period / Risk mitigation / Operational overlap / User evaluation / Module-based implementation / |
Unit 10 - Living in an Online World |
Subunit 2 - Society in an online world |
10.2.1. Online Communities |
|
10.2.2. Digital Divide |
|
10.2.3. Accessibilty |
|
10.2.4. Online Learning |
|
Unit 10 - Computer Systems |
Subunit 3 - System Analysis & Design |
10.3.1. Identifying Stakeholders |
Internal Stakeholders / Managers / Employees / IT Department / Executives / Finance Department / Human Resources / Project Managers / Technical Support / Quality Assurance / Shareholders / Customers / Suppliers / Government / Creditors / Competitors / Media / Regulators / Trade unions / |
Unit 10 - Living in an Online World |
Subunit 3 - Employment in an online world |
10.3.1. Remote Working |
|
Unit 10 - Computer Systems |
Subunit 3 - System Analysis & Design |
10.3.2. Obtaining Stakeholder Requirements |
Stakeholder / Requirement Elicitation / Interviews / Surveys / Observations / Prototyping / Focus Groups / Document Analysis / Brainstorming / Workshops / |
Unit 10 - Living in an Online World |
Subunit 3 - Employment in an online world |
10.3.2. Flexible Working |
|
Unit 10 - Computer Systems |
Subunit 3 - System Analysis & Design |
10.3.3. System Requirements Research Techniques |
Literature Review / Technical research / Current system / Competitor analysis / Technical research / Case Study / |
Unit 10 - Living in an Online World |
Subunit 3 - Employment in an online world |
10.3.3. Impact of Artificial Intelligence |
|
Unit 10 - Computer Systems |
Subunit 3 - System Analysis & Design |
10.3.4. Illustrating System Requirements |
Use cases / Prototyping / entity relationship diagram / system architecture diagram / pseudocode / mockup / flowchart / In Scope / Out of Scope / Success Criteria / Scope Statement / Project Scope / Scope Creep / |
10.3.5. System Development Cycle |
System Design Cycle / Requirements Analysis / System Architecture / Prototyping / Implementation / Testing / Deployment / Maintenance / Feedback / Iteration / |
10.3.6. Software Development Models |
Waterfall Model / Agile Model / Spiral Model / iterative model / incremental model / models / incremental / iterative / adaptability / collaboration / |
10.3.6. End user Involvement |
End users / Design process / User requirements / Feedback / Usability issues / Poor adoption rate / Wasted resources / Competitive disadvantage / Negative reputation / |
Unit 10 - Living in an Online World |
Subunit 4 - Impact on the environment |
10.4.1. Impact of technology on the environment |
|
Unit 10 - Computer Systems |
Subunit 4 - User Focus |
10.4.1. Documentation |
User Manual / Quick Start Guide / Online Help / Tutorial / FAQs / Troubleshooting Guide / Installation Guide / Release Notes / Glossary / Training Materials / tooltip / context / visual cues / Knowledge Base / |
10.4.3. Designing for usability |
System usability / User interface / User experience / Learnability / Efficiency / Effectiveness / Satisfaction / Error prevention / Accessibility / Consistency / kiss approach / system design / simplicity / complexity / architecture / components / interfaces / requirements / constraints / |
10.4.2. Training |
Training Manual / Instructor-led Training / E-learning / Simulation / Hands-on Training / On-the-Job Training / Webinar / Blended Learning / Mentoring / Workshop / Knowledge base / |
Unit 10 - Living in an Online World |
Subunit 5 - Legislation in an online world |
10.5.1. Copyright |
|
10.5.2. Computer Misuse Legislation |
|
10.5.3. Software Licence Types |
|
Subunit 6 - Information in an online world |
10.6.1. Reliability of information |
|
10.6.2. plagiarism |
|
10.6.3. Finding information |
|
Unit 10 - Artificial Intelligence |
Subunit 7 - Artificial Intelligence (AI) |
10.7.1. Large Language Models |
Tokenization / Training corpus / Parameters / Inference / Fine-tuning / Natural language processing / Transformer / Overfitting / Semantic analysis / Bag of words / |
10.7.2. Neural Networks |
|
Unit 10 - Computer Systems |
Subunit 7 - System Integrity & Backup |
10.7.1. Security, Privacy & Integrity of Data |
|
Unit 2 - Programming |
Subunit 1 - Programming Fundamentals & Constructs |
2.1.1. Variables & Constants |
Variable / constant / data type / declaration / assignment / scope / global variable / local variable / type inference / |
2.1.2. Sequencing & Selection (If & switch statements) |
Sequencing / Selection / If statement / Switch statement / Condition / Boolean / Execution path / Nested if statement / Default case / |
2.1.3. Definite Iteration |
Nested Loop / Definite Iteration / For loop / While loop / Iteration / Loop / Counter / Increment / Decrement / Control flow / |
2.1.4. Indefinite Iteration |
Indefinite Iteration / Loop / While loop / Do-while loop / For loop / Break statement / Continue statement / Infinite loop / Conditional loop / Control flow / |
2.1.5. Arithmetic Operators in Python |
Arithmetic Operators / Addition Operator / Subtraction Operator / Multiplication Operator / |
2.1.5. Comparison Operators in Python |
Comparison Operators / == / != / > / < / >= / <= / in / not in / is / |
2.1.6. Logical Operators in Python |
Logical Operators / AND / OR / NOT / XOR / |
2.1.6. Logical Operators in Python |
Logical Operators / AND / OR / NOT / XOR / |
Subunit 2 - Error Handling & Validation |
2.2.1. Error Types |
Syntax Error / Runtime Error / Logic Error / Type Error / Null Pointer Exception / Arithmetic Error / Index Out of Bounds / File Not Found / Overflow Error / Underflow Error / IndentationError / NameError / TypeError / ValueError / IndexError / KeyError / FileNotFoundError / ZeroDivisionError / |
2.2.5. Trace Tables |
Trace Tables / Variable / Expression / Statement / Value / Initial value / Final value / Iteration / Condition / Boolean expression / Logical operator / Relational operator / Concatenation / Debugging / Syntax error / Logic error / Runtime error / Function / Recursion / |
2.2.2. Types of Testing |
Alpha Testing / Beta Testing / Unit Testing / Integration Testing / System Testing / Regression Testing / Performance Testing / Security Testing / Usability Testing / Acceptance Testing / |
2.2.3. Test Plans & Test Data |
Testing / Test Plans / Test Data / Test Case / Test Scenario / Test Suite / Test Execution / Test Coverage / Boundary Testing / Equivalence Partitioning / Regression Testing / |
2.2.4. Debugging Techniques |
Debugging / Breakpoint / Stepping / Variable Watch / Stack Trace / Logging / Assertion / Memory Dump / Code Review / Tracing / Binary Search / |
2.2.5. Trace Tables |
Trace Tables / Variable / Expression / Statement / Value / Initial value / Final value / Iteration / Condition / Boolean expression / Logical operator / Relational operator / Concatenation / Debugging / Syntax error / Logic error / Runtime error / Function / Recursion / |
2.2.6. Verification & Validation |
range check / presence check / format check / length check / syntax check / boundary check / entry verification / validation / luhn / isbn / barcode / checksum / data validation / checksum validation / verification process / barcode scanner / Uniqueness check / Pattern check / Type check / Data integrity / Schema validation / |
Subunit 3 - Data Types |
2.3.1. Strings |
String / Concatenation / Index / Substring / Length / Escape Sequence / Immutable / Comparing / String Methods / Case Sensitivity / |
2.3.2. Integer |
Integer / Positive Integer / Negative Integer / Zero / Prime Integer / Integer Division / Integer Overflow / |
2.3.3. Float data type |
Float data type / Floating-point precision / Floating-point number / Decimal numbers / Floating-point arithmetic / Floating-point exception / Floating-point constant / Overflow / Underflow / Double-precision floating-point / |
2.3.4. Boolean |
Boolean / True / False / Logic / Boolean Operator / AND Operator / OR Operator / NOT Operator / Truth Table / Boolean Algebra / |
Subunit 4 - Data Structures |
2.4.1. 1 Dimensional Arrays |
Array / Elements / Index / Array Size / Initialization / Access / Traversal / Search / Insertion / Deletion / Element / Traverse / Update / Sort / |
2.4.5. Stacks |
Stack / Push / Pop / Peek / |
2.4.6. Queues |
Circular Queue / rear pointer / isFull / head / Priority Queue / Peek / |
2.4.8. Linked Lists |
|
2.4.1. 1 Dimensional Arrays |
Array / Elements / Index / Array Size / Initialization / Access / Traversal / Search / Insertion / Deletion / Element / Traverse / Update / Sort / |
2.4.2. 2 Dimensional Arrays |
2D Array / Rows / Columns / Elements / Index / Initialization / Access / Traversal / Array Length / Nested Arrays / Element / Row / Column / Array Size / Modification / |
2.4.11. Circular Linked Lists |
|
2.4.2. 2 Dimensional Arrays |
2D Array / Rows / Columns / Elements / Index / Initialization / Access / Traversal / Array Length / Nested Arrays / Element / Row / Column / Array Size / Modification / |
2.4.3. Dictionaries |
Dictionary / Key / Value / Mutable / Immutable / Length / Update / Keys / Values / Clear / Pop / Nested Dictionary / Hash Table / Dictionary Methods / Items / Get / In / Copy / Dictionary Comprehension / |
2.4.3. Dictionaries |
Dictionary / Key / Value / Mutable / Immutable / Length / Update / Keys / Values / Clear / Pop / Nested Dictionary / Hash Table / Dictionary Methods / Items / Get / In / Copy / Dictionary Comprehension / |
2.4.5. Records data structure |
Records data structure / Record / Field / Attribute / Key / Value / Index / Linked list / Array / Binary tree / |
Subunit 5 - Advanced Topics |
2.5.1. Functions & Procedures |
Procedure / Parameter / Return Value / Local Variable / Global Variable / Recursion / function / argument / call / modularization / Function scope / Block scope / scope / Subprogram / Return statement / |
2.5.4. Recusion |
Recursion / Base Case / Recursive Case / Call stack / Stack overflow / Backtracking / Stack / Unwinding / Return Address / Stack Frame / |
2.5.2. Strings Methods & String Manipulation |
Strings Methods / String Manipulation / Concatenation / Substring / Length / Indexing / Case Conversion / Replacing / Splitting / Trimming / String slicing / Start index / End index / Step value / Positive index / Negative index / |
2.5.4. Subprogram Libraries |
Subprogram Libraries / Reusable Code / Function Library / Code Reusability / Subroutine Library / Module Library / Library Functions / Modularity / Code Consistency / Version Control / Subprogram / Library / Code reuse / Abstraction / External library / Utility library / Dependency / API / Framework / Package manager / Runtime / Framework library / Scalability / Documentation / |
Subunit 7 - Integrated Developer Environments |
2.7.1. Integrated Developer Environments |
IDE / Code editor / Debugging / Compiler / Syntax highlighting / Version control / Auto-completion / Project management / Syntax errors / Refactoring / |
2.7.1. Integrated Developer Environments |
IDE / Code editor / Debugging / Compiler / Syntax highlighting / Version control / Auto-completion / Project management / Syntax errors / Refactoring / |
Subunit 8 - Trees |
2.8.1. Binary Trees |
binary tree / |
2.8.2. Non Binary Trees |
|
2.8.3. Tree Traversal |
Binary tree / Pre-order traversal / In-order traversal / Post-order traversal / Depth-first search / Breadth-first search / Binary search tree / |
Unit 20 - STEM Robotics |
Subunit 1 - Microbit |
20.1.1. Microbit Basics |
Microbit / Microcontroller / Blockly / LED / Sensor / Bluetooth / Buttons / Compass / Accelerometer / Breakout board / Headers / |
Subunit 2 - Motors & Servos |
20.2.1. Servos |
Feedback Control / Position Error / Closed-loop System / Control Signal / Actuator / Error Signal / Feedback Loop / Continuous Servo / Deadband / |
20.2.1. Directional Servos |
Directional Servo / Control / Microcontroller / MakeCode / Input / Output / Direction / PWM (Pulse Width Modulation) / Feedback / |
20.2.1. Continuous Servos |
Continuous Servo / Microbit / PWM Signal / Input Pins / Output Pins / Programming Environment / Voltage Supply / Speed Control / Direction Control / |
20.2.3. DC Motors |
DC hobby motors / Voltage / Current / Torque / Brushed motor / PWM / Motor shield / Motor drivers / Overcurrent protection / Stepper motors / |
Subunit 3 - Physics |
20.3.1. Moment of a Force |
Moment of a Force / Torque / Lever Arm / Couple / Moment Arm / Equilibrium / Moment Center / |
20.3.2. Pulleys |
Pulley / Tackle / Load / Fixed pulley / Movable pulley / Block and tackle / Mechanical advantage / Compound pulley / Pulley system / |
20.3.3. Gears & Gear Ratios |
Gears / Gear Ratio / Spur Gear / Helical Gear / Gear Train / Worm Gear / |
Subunit 4 - Input Devices |
20.4.1. Buttons & Switches |
Push Button / Tactile Feedback / Momentary Contact / Latching Switch / NO Push Button / NC Push Button / Momentary Switch / Circuit / Current / Voltage / Mechanical Action / |
20.4.2. Analogue Sensors |
Analogue sensors / Microbit / Sensor compatibility / Sensor / Input / Output / |
Unit 25 - Scratch Programming |
Subunit 1 - Scratch Basics |
25.1.4. Introduction to Scratch |
Scratch / Blocks / Stage / Sprite / Script / Costumes / Backdrops / Sound / Variables / Pen / Costume Editor / Scratch Extension / Extensions Library / |
25.1.3. Sprites, Backgrounds & The Stage |
Bitmap Sprite / Vector Sprite / Animated Sprite / Static Sprite / Background Sprite / Character Sprite / UI Sprite / Text Sprite / Tile Sprite / Player Sprite / HUD Sprite / Overlay / |
25.1.. Iteration (repeat, forever loops) |
|
25.1.. Selection (if, elif, else) |
|
Unit 3 - Data |
Subunit 1 - Binary & Hexadecimal |
3.1.1. Binary Numbers |
Binary number / Base 2 / Bit / Nibble / Byte / Binary addition / Binary subtraction / Binary conversion / Binary coded decimal / Floating-point binary number / Encoding / |
3.1.2. Negative Numbers in Binary |
Two's complement / Negative Number / Binary Number / Sign Bit / Overflow / Magnitude / Ones Complement / Binary Representation / Sign and Magnitude / |
3.1.3. Hexadecimal |
Hexadecimal / Base / Digits / Binary / Decimal / Conversion / Representation / Nibble / Byte / |
3.1.4. Binary Addition |
binary addition / binary / addition / bit / carry / overflow / half adder / full adder / binary arithmetic / |
3.1.5. Binary Shifts & Overflow |
Overflow / Binary shift / Binary Shifts / Shift Left / Shift Right / Logical Shift / Arithmetic Shift / Carry Bit / Shift Amount / Binary underflow / Binary arithmetic / Floating point / Machine precision / |
Subunit 2 - Data Representation |
3.2.7. Encoding & Compression Video |
Encoding / Compression / Video / Codec / Bitrate / Resolution / Frame Rate / Keyframe / Lossless Compression / Lossy Compression / |
3.2.1. ASCII & Unicode |
ASCII / Unicode / Character encoding / Code point / Character set / ASCII table / UTF-8 / UTF-16 / Binary representation / Bit / |
3.2.2. B&W Images |
Black and White Images / Pixel / Binary Image / Monochrome / Contrast / Sharpness / Bitmap / Resolution / Bit Depth / File Format / |
3.2.6. Sound Representation |
Sound Representation / Audio Signal / Amplitude / Frequency / Waveform / Sampling Rate / Bit Depth / Digital Audio / Analog-to-Digital Conversion / Condenser microphone / Dynamic microphone / Frequency response / Phantom power / Diaphragm / |
3.2.2. B&W Images |
Black and White Images / Pixel / Binary Image / Monochrome / Contrast / Sharpness / Bitmap / Resolution / Bit Depth / File Format / |
3.2.3. Grayscale Images |
Grayscale image / Intensity / Monochrome / Luminosity / Histogram / Thresholding / Grayscale / Pixel / Bit Depth / Contrast / |
3.2.3. Grayscale Images |
Grayscale image / Intensity / Monochrome / Luminosity / Histogram / Thresholding / Grayscale / Pixel / Bit Depth / Contrast / |
3.2.4. Color Images |
RGB color model / hex code / color depth / additive color mixing / hex color code / Bit Depth / Pixel / 8-bit / 16-bit / 24-bit / |
3.2.4. Color Images |
RGB color model / hex code / color depth / additive color mixing / hex color code / Bit Depth / Pixel / 8-bit / 16-bit / 24-bit / |
3.2.6. Sound Representation |
Sound Representation / Audio Signal / Amplitude / Frequency / Waveform / Sampling Rate / Bit Depth / Digital Audio / Analog-to-Digital Conversion / Condenser microphone / Dynamic microphone / Frequency response / Phantom power / Diaphragm / |
3.2.8. Binary & Denary Prefixes |
binary / denary / prefix / binary prefix / denary prefix / bit / byte / kibibyte / mebibyte / gibibyte / binary search / denary conversion / binary conversion / binary code / megabits / megabytes / |
3.2.9. Calculating file sizes |
|
3.2.1. Calculating Bit Depths |
Bit Depth / Color Depth / Quantization / Pixel / Resolution / |
Subunit 3 - Encryption |
3.3.1. Pigpen Cypher |
Pigpen Cypher / Cipher / Symbol / Substitution Cipher / Cryptography / Encryption / Decryption / Algorithm / Plaintext / Ciphertext / Key / Symbol Set / Repetition / Monoalphabetic Cipher / Polyalphabetic Cipher / Key Length / Cryptanalysis / |
3.3.1. Symmetric & Asymmetric Encryption |
|
3.3.2. Caesar Cipher |
Caesar Cipher / Encryption / Decryption / Shift value / Alphabet / Substitution Cipher / Cipher / Plaintext / Ciphertext / Modulus operator / Brute-force attack / Key / Frequency analysis / Polyalphabetic cipher / Vigenere cipher / Cryptanalysis / Monoalphabetic cipher / Transposition cipher / Rail fence cipher / |
3.3.3. Vigenere Cipher |
Vigenere Cipher / Caesar Cipher / Polyalphabetic Cipher / Encryption / Decryption / Key / Plaintext / Ciphertext / Alphabet / Modulo Operator / Frequency Analysis / Cryptanalysis / Brute Force Attack / Kasiski Examination / Autokey Cipher / Playfair Cipher / Rail Fence Cipher / Transposition Cipher / Substitution Cipher / |
3.3.4. Rail Fence Cipher |
Rail Fence Cipher / Transposition Cipher / Ciphertext / Plaintext / Encryption / Decryption / Zigzag Pattern / Rows / Columns / Block Cipher / Algorithm / Key / Secure Communication / Cryptanalysis / Frequency Analysis / Brute Force Attack / Key Length / Key Space / |
3.3.6. Cryptanalysis |
brute force / frequency analysis / known plaintext / cryptanalysis / ciphertext / encryption / substitution cipher / transposition cipher / dictionary attack / password cracking / rainbow table / password strength / two-factor authentication / account lockout / |
Subunit 4 - Logic |
3.4.2. Truth Tables & Logic Statements |
Truth Tables / Logic Statements / Logical Operators / AND / OR / NOT / Implication / Biconditional / Conditional / Tautology / |
3.4.1. Logic Gates |
Logical operator / AND operator / OR operator / NOT operator / XOR operator / Logic Gates / AND Gate / OR Gate / NOT Gate / NAND Gate / NOR Gate / XOR Gate / XNOR Gate / Half Adder / Full Adder / |
Subunit 7 - Data Backup & Recovery |
3.7.1. Causes of data loss |
Hardware Failure / Software Corruption / Malware Attacks / Human Error / Natural Disasters / Power Outages / Accidental Deletion / Network Failures / Inadequate Backup / Malware infections / Power Outage / Flood / Fire / Earthquake / Hurricane / Tornado / Lightning / Tsunami / Wildfire / Improper Data Handling / Phishing Attacks / Unauthorized Access / Data Breaches / Misconfiguration / Lack of Backup / |
3.7.1. Error Checking |
parity bits / error detection / odd parity / even parity / error correction / redundancy / Parity blocks / Data integrity / Checksum / RAID / Fault tolerance / Striping / Parity calculation / Capacity Overhead / MD5 / CRC / echo check / Automatic Repeat Query / Retransmission / Feedback / Packet Loss / Acknowledgment / Timeout / Sequence Number / Check digit / Luhn algorithm / |
3.7.1. Causes of data loss |
Hardware Failure / Software Corruption / Malware Attacks / Human Error / Natural Disasters / Power Outages / Accidental Deletion / Network Failures / Inadequate Backup / Malware infections / Power Outage / Flood / Fire / Earthquake / Hurricane / Tornado / Lightning / Tsunami / Wildfire / Improper Data Handling / Phishing Attacks / Unauthorized Access / Data Breaches / Misconfiguration / Lack of Backup / |
3.7.2. Consequences of data loss |
Data loss / Data breach / Financial impact / Reputation damage / Legal consequences / Operational disruption / Data recovery costs / Data privacy violations / Customer trust erosion / Regulatory non-compliance / |
3.7.3. Preventing data loss |
Backup / Data Recovery / Encryption / Data Backup Plan / Data Integrity / Disaster Recovery / Version Control / Data Archiving / Redundancy / Automated Backups / RAID / |
3.7.5. Full, Incremental & Differential Backups |
Full Backup / Incremental Backup / Differential Backup / Backup / Storage Medium / Data Loss / Backup Time / Source / |
3.7.7. Failover Systems |
Failover Systems / Redundancy / High Availability System / Automatic Failover / Hot Standby / Cold Standby / |
3.7.7. Failover Systems |
Failover Systems / Redundancy / High Availability System / Automatic Failover / Hot Standby / Cold Standby / |
Subunit 8 - Compression |
3.8.5. Data Compression |
Image Compression / Lossy Compression / Lossless Compression / JPEG / GIF / PNG / Bitrate / Entropy Coding / Compression / Data / Image compression artifacts / Blockiness / Color bleeding / Noise / Ring artifacts / Posterization / Aliasing / |
3.8.2. Run Length Encoding |
Run Length Encoding / encoding / Compression / |
3.8.5. Data Compression |
Image Compression / Lossy Compression / Lossless Compression / JPEG / GIF / PNG / Bitrate / Entropy Coding / Compression / Data / Image compression artifacts / Blockiness / Color bleeding / Noise / Ring artifacts / Posterization / Aliasing / |
Unit 4 - Computers |
Subunit 1 - Computer Models |
4.1.1. Input-Process-Output Model |
Input-Process-Output Model / Input / Process / Output / Data Flow / System / Model / Abstraction / Feedback / Control / |
Subunit 1 - Categories of Digital Devices |
4.1.1. Personal Computers |
Desktop Computer / Laptop Computer / All-in-One Computer / Workstation / Gaming PC / Tablet / Convertibles / Motherboard / Power Supply Unit (PSU) / Graphics Processing Unit (GPU) / Cooling System / Case / Display / Keyboard / Touchpad / Input Devices / |
Subunit 1 - Computer Models |
4.1.2. Sequential, Parallel & Multi-agent Models |
Parallel algorithm / Sequential / Parallel / Multi-agent / Models / Task / Order / Simultaneously / Processors / Threads / Autonomous / |
Subunit 1 - Categories of Digital Devices |
4.1.2. Mobile Devices |
Smartphone / Wearable / App / Operating System / Smartwatch / Touchscreen / Bluetooth / Fitness Tracker / Augmented Reality / |
Subunit 1 - Computer Models |
4.1.3. Von Neumann Architecture |
Von Neumann Architecture / Stored-Program Computer / Central Processing Unit / Memory / Instruction Fetch / Instruction Decode / Instruction Execution / Control Unit / Arithmetic Logic Unit (ALU) / Input/Output (I/O) / bus / control bus / data bus / address bus / register / accumulator / program counter / memory data register / memory address register / instruction register / system bus / |
4.1.4. Fetch – Execute Cycle |
Fetch / Execute / Cycle / Instruction / Memory / CPU / Step / Retrieve / Sequence / Carry out / Fetch-Decode-Execute Cycle / Decode / |
Subunit 12 - Virtualisation |
4.12.2. Hardware Virtualisation |
Virtual Input Devices / Keyboard Emulation / Touchscreen Interface / Gesture Recognition / Virtual Reality Controllers / Motion Tracking Sensors / Eye Tracking Devices / Speech Recognition Software / Brain-Computer Interfaces / Haptic Feedback Devices / Virtual Drive / Disk Image / Mounting / ISO File / Partition / Emulation / Network Drive / File System / RAID / snapshot drives / ramdisk / cloud drive / snapshot / |
4.12.3. Virtual Machines |
Hypervisor / Guest OS / Host OS / Virtualization / Snapshot / Provisioning / Cloning / Containerization / |
4.12.4. Java Virtual Machine |
Bytecode / Garbage Collection / JIT Compiler / ClassLoader / Stack / Execution Engine / Platform Independence / Security Manager / |
4.12.3. Virtual Memory & Paging |
Virtual Memory / Paging / Page Table / Page Fault / Translation Lookaside Buffer / Swap Space / Frame / Memory Mapping / Thrashing / |
Subunit 2 - High & Low Level Languages |
4.2.1. High & Low Level Languages |
High-level language / Low-level language / Compiler / Interpreter / Assembly language / Machine language / Abstraction / Portability / Efficiency / Readability / |
4.2.2. Compilers, Interpreters, Assemblers & Translators |
Compiler / Interpreter / Assembler / Translator / Lexical Analysis / Syntax Analysis / Semantic Analysis / Code Generation / Optimization / Linker / |
Subunit 3 - Hardware |
4.3.1. CPU, GPU & Motherboard |
Central Processing Unit / Microprocessor / Instruction Set / Clock Speed / Cache Memory / Pipeline / Multicore / CPU / heatsink / fan / thermal paste / overclocking / liquid cooling / finned heatsink / GPU / Parallel processing / Graphics memory / Ray tracing / VRAM / memory slots / expansion slots / Power connectors / Form factor / power supply unit / |
4.3.8. Computer Screens |
Screen Resolution / Refresh Rate / Pixel Density / Aspect Ratio / Framebuffer / Input Lag / Tearing / Interpolation / Motion Blur / Clarity / Immersion / User experience / Productivity / eye strain / |
Subunit 3 - Types of Computer |
4.3.5. Embedded Devices |
Embedded devices / Microcontroller / Firmware / Real-time operating system (RTOS) / Sensor / Internet of Things (IoT) / Embedded software / Single-board computer / |
4.3.1. Mainframes |
Mainframe Computers / Batch Processing / Virtualization / Terminal / Parallel Processing / High Availability / Legacy System / Datacenter / Cluster Computing / |
Subunit 3 - Online Services |
4.3.1. Shopping Systems |
E-commerce / Shopping Cart / Payment Gateway / User Interface / Product Catalog / Checkout Process / Inventory Management / Customer Reviews / Digital Marketing / Return Policy / |
Subunit 3 - Hardware |
4.3.9. Sound Controllers |
Sound Card / Digital Audio Converter (DAC) / Analog-to-Digital Converter (ADC) / Bit Depth / Sample Rate / MIDI Controller / External Sound Card / |
Subunit 3 - Online Services |
4.3.2. Ticket Booking Systems |
Booking Engine / Payment Gateway / User Interface / Reservation System / E-Ticket / Cancellation Policy / Mobile Optimization / Dynamic Pricing / |
Subunit 3 - Hardware |
4.3.3. Input Devices |
Touchscreen / Gestures / Trackpad / Mouse / Stylus / Multi-touch / Touchpad / Haptic feedback / Touch-sensitive / Gesture recognition / keyboards / mechanical keyboards / membrane keyboards / ergonomic keyboards / programmable keyboards / pin pad / ATM / POS terminal / Automated input devices / Barcode scanner / Biometric scanner / Optical character recognition (OCR) / Microphone array / Voice recognition / magnetic stripe reader / Chip and PIN / Contactless Payment / Offline PIN Verification / RFID reader / RFID tag / NFC reader / Contactless technology / document scanner / scan / image sensor / dpi / flatbed scanner / duplex scanning / OCR / PDF / Voice Recognition System / Speech recognition / Natural language processing / Text-to-speech / Sensor / Temperature Sensor / Motion Sensor / Proximity Sensor / Light Sensor / Pressure Sensor / Humidity Sensor / Accelerometer / Gyroscope / Analog to Digital Converter / magnetic sensor / magnetometer / Infrared sensor / ultrasonic sensor / ultrasound / transducer / |
4.3.14. SRAM vs DRAM |
SRAM / DRAM / Memory Cell / Refresh Rate / Access Time / Data Retention / Latency / |
Subunit 3 - Types of Computer |
4.3.3. Supercomputers |
Supercomputers / Parallel processing / FLOPS / Cluster computing / Quantum computing / Exascale computing / Petascale / Grid computing / Distributed computing / |
Subunit 3 - Online Services |
4.3.3. Online Banking Systems |
|
Subunit 3 - Hardware |
4.3.4. Output Devices |
Printer / Plotter / Laser printer / Inkjet printer / 3D printer / Extruder / Filament / Build plate / piezoelectric printers / inkjet technology / thermal inkjet / print resolution / print head / monitor / projector / digital signage / VR headset / LCD projector / DLP projector / LED projector / Long throw projector / Full HD projector / e-ink displays / braille display / visually impaired / tactile / embossed / speaker / headphones / sound card / Diaphragm / haptic feedback devices / tactile feedback / force feedback / haptic technology / immersion / kinesthetic sense / wearable haptic devices / |
4.3.5. Peripheral Management |
Peripheral Management / Hardware Interface / Device Driver / Plug and Play / Input Devices / Output Devices / Peripheral Configuration / Peripheral Compatibility / Peripheral Maintenance / Peripheral Troubleshooting / |
Subunit 3 - Types of Computer |
4.3.1. Mainframes |
Mainframe Computers / Batch Processing / Virtualization / Terminal / Parallel Processing / High Availability / Legacy System / Datacenter / Cluster Computing / |
Subunit 3 - Online Services |
4.3.4. Online Training & Education |
|
Subunit 3 - Types of Computer |
4.3.5. Embedded Devices |
Embedded devices / Microcontroller / Firmware / Real-time operating system (RTOS) / Sensor / Internet of Things (IoT) / Embedded software / Single-board computer / |
4.3.3. Supercomputers |
Supercomputers / Parallel processing / FLOPS / Cluster computing / Quantum computing / Exascale computing / Petascale / Grid computing / Distributed computing / |
Subunit 3 - Online Services |
4.3.5. Online Gaming |
|
Subunit 3 - Types of Computer |
4.3.5. Embedded Devices |
Embedded devices / Microcontroller / Firmware / Real-time operating system (RTOS) / Sensor / Internet of Things (IoT) / Embedded software / Single-board computer / |
Subunit 3 - Online Services |
4.3.6. News & Information Resources |
|
4.3.7. Online Auction Sites |
|
4.3.8. Entertainment |
|
Subunit 4 - Software |
4.4.1. BIOS & MBR |
BIOS / MBR / Bootloader / UEFI / CMOS / Firmware / Partition / Primary Partition / Extended Partition / Logical Partition / Active Partition / Dual-Boot / GRUB / Partition Table / Disk Cloning / Disk Imaging / Sector / Head / Platter / Cylinder / |
4.4.2. CLI, GUI & WIMP |
CLI / GUI / WIMP / terminal / shell / command / prompt / output / mouse / keyboard / menu / drag and drop / window / icon / scroll bar / tooltip / shortcut / file explorer / taskbar / control panel / remote access / RDP / SSH / Remote desktop / WYSIWYG / User Interface / Interface / multimedia / digital media / hypermedia / |
4.4.6. User Interface Management |
Window Manager / Taskbar / Desktop Environment / Shell / Menu / Dock / Theme / GUI / Notification Center / Shortcut / Virtual Desktop / Accessibility Options / |
Subunit 4 - The Processor |
4.4.7. Polling vs Interrupts |
Polling / Interrupts / Interrupt Vector / Polling Loop / Interrupt Request (IRQ) / Interrupt Latency / Vectored Interrupts / Race condition / Deadlock / Concurrency / Thread / |
4.4.6. Calculating Processor Speeds |
|
Subunit 4 - Input Devices |
4.4.1. Mice & Trackballs |
Trackball / Mouse / Ergonomics / Precision / Trackpad / Sensitivity / DPI / |
Subunit 4 - Software |
4.4.2. CLI, GUI & WIMP |
CLI / GUI / WIMP / terminal / shell / command / prompt / output / mouse / keyboard / menu / drag and drop / window / icon / scroll bar / tooltip / shortcut / file explorer / taskbar / control panel / remote access / RDP / SSH / Remote desktop / WYSIWYG / User Interface / Interface / multimedia / digital media / hypermedia / |
Subunit 4 - The Processor |
4.4.4. CPU Performance Factors |
Clock Speed / Cache Memory / Instruction Set / Number of Cores / Hyper-Threading / Pipeline Length / Bus Speed / Cache Latency / Power Consumption / Thermal Design Power / Thread Count / Thermal Design Power (TDP) / Instruction Pipelining / |
4.4.10. Process Scheduling |
First Come First Served Scheduling / Scheduling / Policy / Arrival Order / Execution Order / Preemptive / Non-preemptive / Task / Process / Arrival Time / Execution Time / Turnaround Time / Waiting Time / Context Switching / Starvation / Preemption / Burst Time / Round Robin Scheduling / Backfilling / Round Robin Process Scheduling / Time Quantum / Scheduling Algorithm / |
Subunit 4 - Input Devices |
4.4.2. Keyboards & Keypads |
Mechanical Keyboards / Membrane Keyboards / Keycap / Ergonomics / Wireless Keyboards / Function Keys / Backlit Keyboards / Keyboard / Keypad / Mechanical / Membrane / Numeric Keypad / Ergonomics / Key Travel / |
Subunit 4 - Software |
4.4.3. Operating Systems |
Operating System / Multi-tasking / Multi-user / Kernel / Interrupt / Command Line Interface / Graphical User Interface / File System / Device Driver / Virtual Memory / Process / Thread / Deadlock / File Allocation Table (FAT) / Disk Defragmentation / File Compression / Encryption / System Call / Boot Loader / System Tray / |
Subunit 4 - The Processor |
4.4.4. CPU Performance Factors |
Clock Speed / Cache Memory / Instruction Set / Number of Cores / Hyper-Threading / Pipeline Length / Bus Speed / Cache Latency / Power Consumption / Thermal Design Power / Thread Count / Thermal Design Power (TDP) / Instruction Pipelining / |
4.4.13. Pipelining |
Processor Pipelining / Instruction Pipeline / Pipeline Hazard / Data Hazard / Structural Hazard / Pipeline Flush / Hazard / |
Subunit 4 - Software |
4.4.4. System / Utility Software |
Operating System / Utility Software / Compression Software / Backup Software / Disk Defragmenter / Anti-virus Software / Firewall Software / Spyware Removal Software / Data Recovery Software / Encryption Software / Debugging Software / Compiler / Interpreter / Device Driver / Registry Cleaner / System Restore / Task Manager / Disk Cleanup / System Information / File Manager / System Utility Software / Antivirus Software / Driver Updater / Uninstaller / File Compression Software / |
Subunit 4 - The Processor |
4.4.7. Polling vs Interrupts |
Polling / Interrupts / Interrupt Vector / Polling Loop / Interrupt Request (IRQ) / Interrupt Latency / Vectored Interrupts / Race condition / Deadlock / Concurrency / Thread / |
4.4.3. Measuring Processor Performance |
Clock Speed / Instructions Per Cycle (IPC) / Cache Memory / Benchmarking / Thermal Design Power (TDP) / Overclocking / Response Time / Throughput / FLOPS (Floating-Point Operations Per Second) / Memory Bandwidth / Hyper-Threading / |
Subunit 4 - Input Devices |
4.4.4. Microphones |
|
4.4.4. Digital Cameras |
|
Subunit 4 - Software |
4.4.5. Application Software |
Application Software / Operating System / Word Processing Software / Spreadsheet Software / Database Software / Presentation Software / Graphics Software / Web Browser / Email Software / Antivirus Software / Firewall Software / Backup Software / File Compression Software / Media Players / Virtualization Software / Project Management Software / Accounting Software / CRM Software / ERP Software / Desktop Publishing Software / educational software / interactive learning / adaptive learning / gamification / learning management system / simulation software / communication software / email / instant messaging / video conferencing / voice chat / web conferencing / screen sharing / virtual meetings / teleconferencing / entertainment software / video games / music streaming / movie streaming / virtual reality / game development / |
Subunit 4 - Input Devices |
4.4.5. Scanners |
Flatbed Scanner / Sheet-fed Scanner / Handheld Scanner / 3D Scanner / |
Subunit 4 - Software |
4.4.6. Modelling Software |
Modelling software / 3D modelling / CAD software / Simulation software / Data modelling / Statistical modelling / Computer-aided engineering / Rendering software / animation software / keyframe / timeline / Mathematical Modeling Software / |
4.4.6. User Interface Management |
Window Manager / Taskbar / Desktop Environment / Shell / Menu / Dock / Theme / GUI / Notification Center / Shortcut / Virtual Desktop / Accessibility Options / |
Subunit 5 - Storage Devices |
4.5.1. Secondary Memory |
Primary memory / Secondary memory / Hard drive / SSD / |
4.5.1. Magnetic Storage Devices |
Magnetic storage / Hard disk drive / Read/write head / Track / Sector / Platter / Disk controller / Magnetic tape / Tape drive / Backup / Archiving / Data retention / Data recovery / Data redundancy / Data mirroring / Redundant Array of Independent Disks / SATA (Serial ATA) / IDE / Solid-state drive / |
4.5.5. File System Management |
File System Management / File Allocation Table (FAT) / Directory / File Permissions / Disk Fragmentation / File Compression / Disk Quota / Mounting / Defragmentation / Compression / Fragment / Disk Optimization / Lossless Compression / Cluster / Data Integrity / File / Folder / Directory tree / Path / Root directory / Parent directory / Subdirectory / File extension / File system / Partitioning / Logical partition / Master boot record / Drive letter / |
Subunit 5 - Primary Memory |
4.5.2. RAM & Cache |
Cache Memory / Hits / Misses / RAM / Memory Module / Virtual Memory / Latency / Non-volatile Memory / Memory Management / Swap Space / |
Subunit 5 - Output Devices |
4.5.1. Monitors / Screens |
|
Subunit 5 - Application Software |
4.5.1. Computer Aided Design Software (CAD) |
CAD / 3D Modeling / Drafting / Rendering / Prototyping / Vector Graphics / Mesh / Simulation / CAM / Blueprint / Architectural plan / Engineering drawing / Scale drawing / Floor plan / Elevation drawing / Section drawing / |
Subunit 5 - Storage Devices |
4.5.2. Optical Storage Devices |
Optical Storage Devices / CD-ROM / DVD / Blu-Ray / Read-only / Write-once / Rewritable / Sector / Track / Pit / Land / Laser / Optical Disc Drive / Reflectivity / Data Density / Rotational Speed / Access Time / Buffer / Caddy / Tray / |
4.5.8. RAID ( Redundant Array of Independent Disks) |
Redundant Array of Independent Disks / Striping / Mirroring / Parity / RAID Level 0 / RAID Level 1 / RAID Level 5 / RAID Level 10 / |
4.5.1. Secondary Memory |
Primary memory / Secondary memory / Hard drive / SSD / |
Subunit 5 - Primary Memory |
4.5.2. RAM & Cache |
Cache Memory / Hits / Misses / RAM / Memory Module / Virtual Memory / Latency / Non-volatile Memory / Memory Management / Swap Space / |
4.5.2. ROM (Read Only Memory) |
ROM / Firmware / Boot-up Sequence / Erasable Programmable ROM (EPROM) / Bootloader / Flashing tool / Bricking / ROM flashing / |
Subunit 5 - Output Devices |
4.5.2. Projectors |
Projector / Lamp Life / Throw Ratio / Home Theater / Interactive Projector / |
Subunit 5 - Storage Devices |
4.5.2. Optical Storage Devices |
Optical Storage Devices / CD-ROM / DVD / Blu-Ray / Read-only / Write-once / Rewritable / Sector / Track / Pit / Land / Laser / Optical Disc Drive / Reflectivity / Data Density / Rotational Speed / Access Time / Buffer / Caddy / Tray / |
4.5.3. Electrical Storage Devices (SSD,Flash Drive) |
Electrical Storage Devices / SSD / Flash Drive / Storage / Energy / Data / Integrated Circuits / Portable / Flash Memory / Digital / |
Subunit 5 - Primary Memory |
4.5.3. Memory Performance Factors |
Memory Bandwidth / Latency / Clock Speed / Memory Type / Memory Size / Memory Hierarchy / Memory Controller / bus width / memory clock speed / bandwidth / |
Subunit 5 - Output Devices |
4.5.3. Inkjet Printers |
Inkjet / Cartridge / DPI / Paper feed / Print head / Print speed / Bubblejet / |
Subunit 5 - Storage Devices |
4.5.3. Electrical Storage Devices (SSD,Flash Drive) |
Electrical Storage Devices / SSD / Flash Drive / Storage / Energy / Data / Integrated Circuits / Portable / Flash Memory / Digital / |
4.5.4. Cloud Storage |
Cloud Storage / Virtualization / Data Migration / Data Center / Data Redundancy / Cloud Service Provider / Security Protocols / Subscription Model / Data Encryption / Data Replication / Private Cloud / Public Cloud / Hybrid Cloud / Network Latency / Cloud Backup / Disaster Recovery / Cloud Availability / Cloud Scalability / Data Center Virtualization / Cloud Deployment Model / |
Subunit 5 - Primary Memory |
4.5.3. Memory Performance Factors |
Memory Bandwidth / Latency / Clock Speed / Memory Type / Memory Size / Memory Hierarchy / Memory Controller / bus width / memory clock speed / bandwidth / |
Subunit 5 - Storage Devices |
4.5.4. Cloud Storage |
Cloud Storage / Virtualization / Data Migration / Data Center / Data Redundancy / Cloud Service Provider / Security Protocols / Subscription Model / Data Encryption / Data Replication / Private Cloud / Public Cloud / Hybrid Cloud / Network Latency / Cloud Backup / Disaster Recovery / Cloud Availability / Cloud Scalability / Data Center Virtualization / Cloud Deployment Model / |
4.5.5. Online, Offline, Onsite & Offsite Backups |
Backup / Data loss / Disaster recovery / Incremental backup / Full backup / Differential backup / Off-site backup / On-site backup / Magnetic tape backup / Cloud backup / In-house backup / Third-party backup / Backup frequency / Backup retention / Backup verification / Virtual server backup / Physical server backup / Bare-metal restore / Backup compression / Backup encryption / Onsite backups / Offsite backups / Data redundancy / Backup validation / backup legislative compliance / compliance / audit trail / Online Backups / Offline Backups / Remote Server / Cloud-Based Storage / |
Subunit 5 - Output Devices |
4.5.5. Laser Printers |
Laserjet / Toner / Resolution / Duplex Printing / Cartridge / Driver / |
4.5.6. 3D Printers |
Fused Deposition Modeling / Slicing Software / Filament / Resolution / Print Bed / Extruder / 3D Model / Support Structure / Layer Height / Post-Processing / |
Subunit 5 - Primary Memory |
4.5.2. ROM (Read Only Memory) |
ROM / Firmware / Boot-up Sequence / Erasable Programmable ROM (EPROM) / Bootloader / Flashing tool / Bricking / ROM flashing / |
Subunit 5 - Output Devices |
4.5.7. Laser cutters / engravers |
|
4.5.8. Graph Plotters |
|
Unit 5 - Networking |
Subunit 1 - Networks |
5.1.4. Wired Network Hardware |
Wireless Access Point / Bridge / Wi-Fi / SSID / WPA2 / encryption / |
5.1.6. Wired Networks |
Wired Networks / Ethernet / LAN / Router / Switch / Cable / Fiber Optics / Bandwidth / CAT5e / |
5.1.7. Wireless Network & Hardware |
Wireless Networks / Wireless Communication / Wi-Fi / Bluetooth / Mobile Network / Cellular Network / LAN / WAN / Signal Strength / Roaming / Satellite network / Mesh network / Ad hoc network / NFC / |
5.1.1. Introduction to networking |
Networking / Router / Switch / IP Address / Protocol / LAN / WAN / Firewall / DNS / Ethernet / |
5.1.6. Wired Networks |
Wired Networks / Ethernet / LAN / Router / Switch / Cable / Fiber Optics / Bandwidth / CAT5e / |
5.1.7. Wireless Network & Hardware |
Wireless Networks / Wireless Communication / Wi-Fi / Bluetooth / Mobile Network / Cellular Network / LAN / WAN / Signal Strength / Roaming / Satellite network / Mesh network / Ad hoc network / NFC / |
5.1.10. Digital Currencies |
Bitcoin / Blockchain / Cryptocurrency / Decentralization / Fiat Currency / Mining / Smart Contract / Token / Wallet / altcoins / |
5.1.10. TCP/IP Network Stack |
Network Stacks / Layers / Data Link Layer / Network Layer / Transport Layer / Application Layer / network stack / TCP/IP / routing / interoperability / Scalability / Reliability / Interchangeability / Evolvability / frames / packets / segments / payload / |
5.1.11. Mobile communication standards |
wifi / router / hotspot / SSID / encryption / bandwidth / signal strength / access point / Authentication / Key / Vulnerability / Cracking / Internet of things / Sensors / Smart Home / Security / |
5.1.15. Storage Area Networks |
Storage Area Networks / Fibre Channel / RAID / Snapshot / Storage Array / |
5.1.2. Types of networks – LAN,WAN,PAN |
LAN / WAN / PAN / Network / Topology / Router / Switch / Firewall / IP Address / Packet / Bandwidth / Latency / Scalability / Quality of Service (QoS) / Traffic shaping / Internet of Things / Fitness Tracking / Wearable Devices / Smartwatches / Healthcare Monitoring / Personalized Entertainment / Smart Homes / Location Tracking / Mobile Payments / Encryption / WLAN / Wireless access point / SSID / Frequency band / Signal strength / |
5.1.15. Virtual Private Networks |
Virtual Private Network (VPN) / Tunneling / VPN Client / IPSec / Anonymity / Remote Access VPN / Site-to-Site VPN / IPSec VPN / PPTP / OpenVPN / VPN server / |
5.1.3. Network Topologies |
Network Topologies / Bus Topology / Star Topology / Ring Topology / Mesh Topology / Tree Topology / Hybrid Topology / Client-Server Topology / Peer-to-Peer Topology / Fully Connected Topology / |
5.1.11. Mobile communication standards |
wifi / router / hotspot / SSID / encryption / bandwidth / signal strength / access point / Authentication / Key / Vulnerability / Cracking / Internet of things / Sensors / Smart Home / Security / |
5.1.5. Client server vs Peer to Peer |
Client server / Peer to Peer / Server / Client / Centralized / Decentralized / Scalability / Reliability / Security / Efficiency / P2P network / File sharing / Distributed network / Resource sharing / Fault tolerance / |
5.1.5. OSI Network Stack |
OSI Network Stack / Application Layer / Presentation Layer / Session Layer / Transport Layer / Network Layer / Data Link Layer / Physical Layer / Protocol / Layered Architecture / Standardization / Interchangeability / Reliability / Flexibility / Scalable Architecture / Integration / |
5.1.10. TCP/IP Network Stack |
Network Stacks / Layers / Data Link Layer / Network Layer / Transport Layer / Application Layer / network stack / TCP/IP / routing / interoperability / Scalability / Reliability / Interchangeability / Evolvability / frames / packets / segments / payload / |
5.1.8. Network Speeds |
Network Speeds / Bandwidth / Latency / Ping / Download Speed / Upload Speed / Throughput / Jitter / Quality of Service (QoS) / Packet Loss / |
5.1.9. Network Protocols |
TCP / UDP / HTTP / HTTPS / FTP / SMTP / POP3 / IMAP / SSH / NTP / DNS / DHCP / ARP / IPSEC / Network Protocol / Handshake / Standard / IPv4 / IPv6 / SSL/TLS / |
Subunit 2 - Internet & World Wide Web |
5.2.6. Internet Protocols |
Internet Protocol / IP Address / TCP/IP / HTTP / DNS / FTP / SMTP / POP / IMAP / HTTPS / |
5.2.1. Internet vs WWW |
Internet / WWW / Network / Browser / HTML / URL / ISP / HTTP / Download / Upload / instant messaging client / text messaging / file sharing / group chat / emoticons / presence status / email clients / inbox / spam / attachment / folders / cloud storage client / file syncing / automatic backup / offline access / |
Subunit 2 - Wired Network Hardware |
5.2.1. Servers |
servers / hosting / data center / virtualization / dedicated server / redundancy / |
5.2.2. Switches |
Switch / Hub / Network Switch / MAC address table / MAC address / Physical port / Switching / |
Subunit 2 - Internet & World Wide Web |
5.2.2. IP v4, IPv6 & MAC Addresses |
IPv4 / IPv6 / MAC Address / IP / Internet Protocol version 4 / Internet Protocol version 6 / Media Access Control Address / Network Interface / Data Link Layer / OSI Model / public IP / private IP / NAT / MAC Addresses / mac address spoofing / |
5.2.3. HTTP, HTML, CSS & Javascript |
HTTP / HTML / URL / GET / POST / HTTP Response / Status Code / Header / Hyperlink / Tag / HTTP Cookie / Session Cookie / Persistent Cookie / Tracking Cookie / Selector / Value / embedded inline external CSS / style attribute / external CSS / stylesheet / cascade / |
Subunit 2 - Wired Network Hardware |
5.2.2. Switches |
Switch / Hub / Network Switch / MAC address table / MAC address / Physical port / Switching / |
5.2.3. Routers |
Router / Firewall / Routing / IP Addressing / Network Address Translation (NAT) / Quality of Service (QoS) / Virtual Private Network (VPN) / Load Balancing / Packet Filtering / |
5.2.3. Routers |
Router / Firewall / Routing / IP Addressing / Network Address Translation (NAT) / Quality of Service (QoS) / Virtual Private Network (VPN) / Load Balancing / Packet Filtering / |
5.2.4. Modems |
Modem / |
Subunit 2 - Internet & World Wide Web |
5.2.4. URLS, DNS & Address resolution |
URL / DNS / Address Resolution / Domain / IP Address / Top-Level Domain (TLD) / Hostname / Resolver / URL Encoding / Root DNS Server / subdomain / Host / Hierarchy / Parent Domain / Domain Registrar / Top level domain / Domain Name / DNS Resolver / DNS Record / TTL (Time to Live) / TLD (Top-Level Domain) / Authoritative Name Server / |
5.2.5. Components of the World Wide Web |
World Wide Web / HTML / URL / HTTP / Web Browser / Hyperlink / Website / Web Server / CSS / JavaScript / |
Subunit 2 - Wired Network Hardware |
5.2.1. Servers |
servers / hosting / data center / virtualization / dedicated server / redundancy / |
5.2.5. Wired Network Transmission Media |
Ethernet Cable / Ethernet / bandwidth / |
5.2.4. Modems |
Modem / |
5.2.5. Wired Network Transmission Media |
Ethernet Cable / Ethernet / bandwidth / |
5.2.7. Network Interface Cards |
Network Interface Card (NIC) / Network interface controller / Ethernet / Full Duplex / |
Subunit 2 - Internet & World Wide Web |
5.2.12. Packets |
Packet / Header / Payload / Protocol / Routing / Checksum / Fragmentation / TTL (Time to Live) / Version / Header Length / Type of Service / Total Length / Identification / Flags / Fragment Offset / Time to Live / Header Checksum / Source Address / Destination Address / |
Subunit 3 - Network Security |
5.3.1. Network validation & authentication |
Network validation / Authentication / Network security / Digital certificate / Biometric authentication / Access control / Two-factor authentication / Intrusion detection system / Firewall / Security audit / password authentication / credentials / authentication factor / hashing / salt / phishing / asymmetric encryption / symmetric encryption / public key / private key / key exchange / encryption / decryption / certificate authority / digital signature / certificate revocation / key pair / |
5.3.1. Viruses |
computer virus / Antivirus / Trojan Horse / Worm / Ransomware / |
5.3.1. Malware |
Malware / Virus / Trojan / Ransomware / Spyware / Adware / Worm / Rootkit / Keylogger / Phishing / |
5.3.1. Spyware |
spyware / |
5.3.1. Phishing |
Phishing / Spoofing / Two-factor authentication / Phishing website / |
5.3.1. DDOS Attacks |
DDoS Attack / Zombie Computers / Amplification Attack / Packet Flooding / |
5.3.1. Brute Force Attacks |
brute force attacks / dictionary attack / |
5.3.1. SQL Injection Attacks |
SQL injection / Input sanitation / |
5.3.1. Insider Threats |
Insider Threats / Privileged Access / |
5.3.1. Social Engineering |
Social Engineering / Pretexting / Baiting / Tailgating / Impersonation / Spear Phishing / |
5.3.1. Physical Network Attacks |
Physical system attacks / Eavesdropping / Tampering / Impersonation / Physical Tapping / |
5.3.1. Botnets |
Botnet / Zombie Computers / Command and Control Server / Infected Devices / Bot Herders / |
5.3.1. DDOS Attacks |
DDoS Attack / Zombie Computers / Amplification Attack / Packet Flooding / |
5.3.1. Botnets |
Botnet / Zombie Computers / Command and Control Server / Infected Devices / Bot Herders / |
5.3.12. Symmetric & Asymmetric Encryption |
Symmetric Encryption / Key / Cipher / Block Cipher / Stream Cipher / Encryption / Decryption / AES / Asymmetric Encryption / Key Pair / RSA Algorithm / Digital Signature / Key Exchange / Secure Communication / Digital Signatures / Authentication / Confidentiality / Non-repudiation / Certificate Authority / Digital Certificate / Public Key / Private Key / Root Certificate / Revocation / |
5.3.13. IPSec |
Internet Protocol Security / Authentication Header / Encapsulating Security Payload / Key Management Protocol / Transport Mode / Tunnel Mode / Security Association / Intrusion Detection System / Access Control List / |
5.3.14. Wireless Network Encryption |
Wired Equivalent Privacy / Wi-Fi Protected Access / WPA2 / WPA3 / |
5.3.1. SQL Injection Attacks |
SQL injection / Input sanitation / |
5.3.14. Wireless Network Encryption |
Wired Equivalent Privacy / Wi-Fi Protected Access / WPA2 / WPA3 / |
5.3.1. Network validation & authentication |
Network validation / Authentication / Network security / Digital certificate / Biometric authentication / Access control / Two-factor authentication / Intrusion detection system / Firewall / Security audit / password authentication / credentials / authentication factor / hashing / salt / phishing / asymmetric encryption / symmetric encryption / public key / private key / key exchange / encryption / decryption / certificate authority / digital signature / certificate revocation / key pair / |
5.3.3. Protecting networks |
Firewall / Antivirus / Intrusion Detection System / Encryption / Virtual Private Network / Two-factor authentication / Access control / Intrusion Prevention System / Vulnerability scanning / Security policy / Antivirus Software / Network Segmentation / network security audit / penetration testing / Acceptable Use Policy / User Agreement / Internet Usage Policy / incident response plan / mitigation / |
5.3.1. Viruses |
computer virus / Antivirus / Trojan Horse / Worm / Ransomware / |
Subunit 3 - Wireless Networks |
5.3.2. Wireless Network Hardware |
NAT / Private IP / Public IP / LAN / Gateway / Router / IP Lease / dhcp / DHCP server / authentication / integrity / authentication protocol / |
Subunit 3 - Network Security |
5.3.3. Protecting networks |
Firewall / Antivirus / Intrusion Detection System / Encryption / Virtual Private Network / Two-factor authentication / Access control / Intrusion Prevention System / Vulnerability scanning / Security policy / Antivirus Software / Network Segmentation / network security audit / penetration testing / Acceptable Use Policy / User Agreement / Internet Usage Policy / incident response plan / mitigation / |
5.3.3. Protecting networks |
Firewall / Antivirus / Intrusion Detection System / Encryption / Virtual Private Network / Two-factor authentication / Access control / Intrusion Prevention System / Vulnerability scanning / Security policy / Antivirus Software / Network Segmentation / network security audit / penetration testing / Acceptable Use Policy / User Agreement / Internet Usage Policy / incident response plan / mitigation / |
Subunit 5 - Email |
5.5.1. Email Protocols |
POP / SMTP / IMAP / Email client / Mailbox / Port / Mail Server / |
Unit 6 - Ethical, Legal & Social Issues |
Subunit 1 - Ethical Issues & responsibilities |
6.1.1. Environmental Impact of technology on society |
Environmental Impact / Technology / Society / Pollution / E-waste / Carbon footprint / Deforestation / Resource depletion / Digital divide / Greenwashing / Renewable energy / Energy efficiency / Green buildings / Eco-friendly transportation / Smart grid / Waste reduction / Precision agriculture / Environmental monitoring / Telecommuting / Habitat Loss / Species Extinction / Ecosystem / Fragmentation / |
6.1.3. Inclusion in Computing |
Inclusion in Computing / Diversity / Equity / Underrepresented / Bias / Accessibility / Empowerment / Intersectionality / Growth Mindset / Allyship / Digital inclusion / Assistive technology / Web accessibility / Screen reader / Captioning / Inclusive design / Accessible Document Format / Alt Text / Tagged PDF / gender bias / gender gap / glass ceiling / equal opportunities / stereotype / work-life balance / mentorship / Harassment / Sexual Harassment / Microaggression / Digital divide / Technology gap / Internet inequality / Technological disparity / Access divide / Information divide / Connectivity gap / Digital literacy / Information literacy / Computer literacy / Internet literacy / Media literacy / Cybersecurity / |
6.1.1. Computer Usage Laws |
Legal Considerations / Contract Law / Intellectual Property / Privacy Laws / Employment Law / Compliance / Tort Law / Cybersecurity / Consumer Protection / Corporate Governance / Software Copyright / Patents / Infringement / Trade Secret / Open Source / Invention / Fair Use / Freeware / Shareware / Proprietary / Commercial / Public domain / Trialware / End-user license agreement (EULA) / Site license / Software license / Open source license / Freeware license / Shareware license / Commercial license / Single user license / Multi-user license / Multi User License / Cybercrime Laws / Computer Fraud / Digital Forensics / Online Harassment / Ransomware / Identity Theft / Intellectual Property Laws / Copyright / Trademark / Patent / Creative Commons / Data Protection / Breach Notification / Consent / Cybersecurity Laws / Online Defamation / Cyberbullying / Social Media / Slander / Harassment / Trolling / Online Reputation Management / Anonymity / Impersonation / Domain Name Disputes / Cybersquatting / Uniform Domain-Name Dispute-Resolution Policy (UDRP) / DNS Hijacking / |
6.1.1. Copyright |
Copyright / Intellectual Property / Fair Use / Plagiarism / Public Domain / Licensing / Exclusive Rights / Infringement / |
6.1.1. Software License Types |
Licensing / Proprietary license / Open Source / Proprietary / Freeware / Shareware / Public Domain / Copyleft / GNU General Public License (GPL) / Commercial License / |
6.1.2. Data & Online Privacy |
Data / Online Privacy / Encryption / Cookies / Cybersecurity / Anonymity / Data Breach / Phishing / Digital Footprint / Privacy Policy / Data privacy / Security breach / Identity theft / Data breaches / Tracking / Consent / accuracy / retention / data protection laws / personal data / data subject / data controller / Data Minimization / Anonymization / |
6.1.1. Computer Usage Laws |
Legal Considerations / Contract Law / Intellectual Property / Privacy Laws / Employment Law / Compliance / Tort Law / Cybersecurity / Consumer Protection / Corporate Governance / Software Copyright / Patents / Infringement / Trade Secret / Open Source / Invention / Fair Use / Freeware / Shareware / Proprietary / Commercial / Public domain / Trialware / End-user license agreement (EULA) / Site license / Software license / Open source license / Freeware license / Shareware license / Commercial license / Single user license / Multi-user license / Multi User License / Cybercrime Laws / Computer Fraud / Digital Forensics / Online Harassment / Ransomware / Identity Theft / Intellectual Property Laws / Copyright / Trademark / Patent / Creative Commons / Data Protection / Breach Notification / Consent / Cybersecurity Laws / Online Defamation / Cyberbullying / Social Media / Slander / Harassment / Trolling / Online Reputation Management / Anonymity / Impersonation / Domain Name Disputes / Cybersquatting / Uniform Domain-Name Dispute-Resolution Policy (UDRP) / DNS Hijacking / |
6.1.3. Inclusion in Computing |
Inclusion in Computing / Diversity / Equity / Underrepresented / Bias / Accessibility / Empowerment / Intersectionality / Growth Mindset / Allyship / Digital inclusion / Assistive technology / Web accessibility / Screen reader / Captioning / Inclusive design / Accessible Document Format / Alt Text / Tagged PDF / gender bias / gender gap / glass ceiling / equal opportunities / stereotype / work-life balance / mentorship / Harassment / Sexual Harassment / Microaggression / Digital divide / Technology gap / Internet inequality / Technological disparity / Access divide / Information divide / Connectivity gap / Digital literacy / Information literacy / Computer literacy / Internet literacy / Media literacy / Cybersecurity / |
6.1.1. Software License Types |
Licensing / Proprietary license / Open Source / Proprietary / Freeware / Shareware / Public Domain / Copyleft / GNU General Public License (GPL) / Commercial License / |
6.1.4. Professionalism in the world of IT |
Professionalism / Ethics / Accountability / Communication / Integrity / Confidentiality / Professional Development / Adaptability / Teamwork / Problem-solving / Objectivity / Competence / Fairness / Responsibility / Respect / Sustainability / harassment / whistleblower / reporting / discrimination / retaliation / code of conduct / whistleblower protection / moonlighting / conflict of interest / Continuing education / Certifications / Industry conferences / Online courses / Self-study / Mentorship / Professional networking / |
Subunit 2 - Current Trends |
6.2.1. Artificial Intelligence |
Machine learning / Genetic algorithm / Artificial Intelligence / Neural Networks / Natural Language Processing / Expert Systems / Computer Vision / Deep Learning / Chatbots / Robotics / Data Mining / Cognitive Computing / Autonomous Vehicles / Artificial General Intelligence / Reinforcement Learning / Algorithm / Big Data / Genetic Algorithms / Intelligent Agents / Artificial Neural Networks / generative models / unsupervised learning / generative AI / artificial creativity / Cost savings / Predictive Analytics / Data Analysis / AI Bias / Lack of Creativity / Job Displacement / Ethical Dilemmas / Privacy Concerns / Security Risks / Dependency on AI / Limited Emotional Intelligence / Transparency / Explainability / AI negative impact on the environment / Data center emissions / |
6.2.2. Quantum Computing |
Quantum Computing / Superposition / Entanglement / Qubit / Quantum Gate / Decoherence / Quantum Supremacy / Quantum Algorithm / Quantum Error Correction / Hadamard Gate / Quantum cryptography / Quantum key distribution / Eavesdropping / Quantum-resistant cryptography / Quantum bits (qubits) / |
6.2.3. DNA Computing |
DNA Computing / Adleman / Parallelism / Algorithm / Hybridization / Molecular Computation / Turing Complete / DNA Strand / Nanotechnology / |
6.2.4. Nano Computing |
Nano Computing / Quantum Dots / Nanowires / Molecular Electronics / Quantum Computing / Nanoparticles / Nanotechnology / Nanocomponents / Self-Assembly / Nanorobotics / Nanomedicine / Nanoelectronics / Nanomaterials / Molecular manufacturing / Bio-nanotechnology / Nano-encapsulation / Nanofabrication / |
Unit 7 - Databases |
Subunit 1 - Databases Fundamentals |
7.1.1. Introduction to databases |
Database / Information Systems / Relational Database / SQL / Database Management System (DBMS) / Data / Information / Value / Accuracy / Relevance / Interpretation / Knowledge / Data Quality / Data Processing / Decision Making / Object-Oriented Database / Graph Database / Time-Series Database / Distributed Database / NoSQL Database / Flat file database / Record / Field / Delimiter / spatial database / in-memory database / replication / data partitioning / |
7.1.6. Object Oriented Databases |
Object Oriented Database / Object / Class / Inheritance / Encapsulation / Polymorphism / Association / Aggregation / Query Language / |
7.1.10. Methods of database interaction |
SQL / Relational Database / Query / Data Manipulation / Database Schema / QBE / Graphical User Interface / Non-technical Users / Visual query systems / Drag-and-drop interface / Natural Language Interfaces / |
7.1.2. Database Transactions |
ACID approach / Transaction / Atomicity / Consistency / Isolation / Durability / Concurrency / Redo Log / Undo Log / Locking / transaction log / audit trail / log file / recovery / logging / point-in-time recovery / undo operation / redo operation / database transactions / commit / rollback / isolation level / deadlock / concurrency control / Savepoint / Serializability / transaction scheduling / timestamp ordering / serialization / two-phase locking / Operation / Query / Record / |
7.1.8. Database Segmentation |
Database Segmentation / Segment / Segmentation Criteria / Segmentation Strategy / Data Type / Geographic Segmentation / Demographic Segmentation / Psychographic Segmentation / Behavioral Segmentation / Customer Segmentation / |
7.1.2. Database Management System |
Database Management Systems / Relational Database / SQL / Normalization / Index / Backup / Query / Transaction / Data Warehousing / Database Administrator / Database storage engine / SQLite / database security / query optimization / indexing / data redundancy / data integrity / |
7.1.3. Relational Databases |
Relational Databases / Tables / Primary Key / Foreign Key / Normalization / SQL / Indexes / Transactions / ACID properties / Join / Junction Table / Many-to-Many Relationship / Composite Key / One to One / One to Many / Many to Many / Entity / Database Schema / |
7.1.2. Database Management System |
Database Management Systems / Relational Database / SQL / Normalization / Index / Backup / Query / Transaction / Data Warehousing / Database Administrator / Database storage engine / SQLite / database security / query optimization / indexing / data redundancy / data integrity / |
7.1.3. Entity Relationship Diagrams |
Entity / Relationship / Attribute / Cardinality / Associative Entity / Junction table / Many-to-many relationship / Entity Relationship Diagram (ERD) / Conceptual ERD / Logical ERD / Physical ERD / Primary Key / Foreign Key / |
7.1.5. Data Integity |
Entity Integrity / Referential Integrity / Domain Integrity / Orphaned Record / Cascade Delete / data integrity / data anomaly / integrity constraint / data validation / |
7.1.10. Data Warehousing |
Data Warehousing / ETL / Fact Table / Data Mart / OLAP / Data Mining / Data Cleansing / business intelligence / data analysis / dashboard / predictive analytics / data visualization / Extract / Transform / Load / Extraction / Validation / ETL Tool / Real Time Updates / Change Data Capture / Batch Processing / Data Latency / event driven architecture / micro-batch processing / real-time analytics / |
7.1.8. Database Administrator |
Database Administrator / Database Management System / Data Backup / Data Recovery / Database Security / Database Performance Tuning / SQL / Data Migration / Database Design / Data Integrity / |
7.1.8. 1st, 2nd & 3rd Normal Form |
1st Normal Form / 2nd Normal Form / 3rd Normal Form / Normalization / Primary Key / Atomic Values / Dependency / Data Redundancy / |
Subunit 2 - SQL |
7.2.1. Database Definition Language |
Database / Language / Database Definition Language / Schema / Column / Constraint / Primary Key / Foreign Key / SQL / DDL / Data Manipulation Language / CREATE TABLE / ALTER TABLE / DROP TABLE / TRUNCATE TABLE / ADD COLUMN / DROP COLUMN / RENAME TABLE / |
7.2.2. SELECT Queries |
|
7.2.2. Database Manipulation Language |
Derived field / Parameters / Parameterized query / Injection attacks / SQL injection / Parameter markers / Placeholder / Database View Query / Database / View / Query / Virtual Table / Data Retrieval / aggregate / join / filter / sort / conditional / subquery / group by / having / distinct / limit / |
7.2.2. SELECT Queries |
|
7.2.1. Database Definition Language |
Database / Language / Database Definition Language / Schema / Column / Constraint / Primary Key / Foreign Key / SQL / DDL / Data Manipulation Language / CREATE TABLE / ALTER TABLE / DROP TABLE / TRUNCATE TABLE / ADD COLUMN / DROP COLUMN / RENAME TABLE / |
Subunit 3 - Data Science |
7.3.1. Data Mining |
Data mining / Pattern recognition / Clustering / Classification / Association rule mining / Machine learning / Data preprocessing / Decision tree / Feature selection / Big data / |
7.3.3. Predictive Modelling |
Predictive Modelling Process / Data Collection / Data Cleaning / Feature Selection / Model Training / Model Evaluation / Model Tuning / Deployment / Monitoring / Data Preparation / Cross-validation / Regression Analysis / Decision Tree / Random Forest / Support Vector Machine / Neural Network / Logistic Regression / K-Nearest Neighbors / Gradient Boosting / Time Series Forecasting / Ensemble Learning / |
Subunit 4 - Database Types |
7.4.15. Network Data Model |
Network Data Model / Graph / Node / Edge / Attribute / Directed Graph / Undirected Graph / |
7.4.1. Multi-Dimensional Databases |
Multi-dimensional databases / Dimensions / Cubes / Measures / Hierarchies / Slicing / Dicing / Roll-up / Drill-down / OLAP / |
Unit 8 - Monitoring & Control Systems |
Subunit 1 - Monitoring & Control Systems |
8.1.1. Monitoring Systems |
|
8.1.2. Control Systems |
open loop control system / closed loop control system / feedback / reference input / error signal / controller / actuator / sensor / proportional control / integral control / PID control / Setpoint / Error / derivative / Electrical actuator / Solenoid / Stepper motor / Brushless DC motor / Linear actuator / Piezoelectric actuator / Servo motor / Pulse Width Modulation / |
8.1.3. Distributed Control Systems |
Centralised Control / Distributed System / Scalability / Reliability / Fault Tolerance / Latency / Data Consistency / Performance / Load Balancing / |
Subunit 2 - Automatic Control Systems |
8.2.1. Automatic Doors |
Sensor / Actuator / Control Unit / Automatic Opening / Safety System / Access Control / Integration / Remote Control / Power Supply / User Interface / |
8.2.4. Elevators |
Controller / Sensor / Microprocessor / Human-Machine Interface / Drive System / Load Sensor / Safety Brakes / Door Mechanism / Control Algorithm / Variable Frequency Drive / Proximity Sensor / Limit Switch / Infrared Sensor / Emergency Stop Switch / |
8.2.4. Traffic Lights |
Traffic Signal / Cycle Time / Adaptive Control / Phase / Timing Plan / Sensor Data / Traffic Flow / |
Subunit 5 - Industrial Systems |
8.5.2. Process Control Systems |
Process control systems / Sensors / Actuators / Feedback Control Systems / Setpoint / Feedforward control systems / Proportional control / Integral control / Derivative control / Real-Time Data Analysis / Industrial automation / Disturbances / |
8.5.2. Industrial Robots |
Industrial robots / Automation / Artificial intelligence / Collaborative Robots (Cobots) / Articulated Robots / SCARA Robots / Robot Arm / End Effector / Sensors / Actuators / Control System / Open-loop System / Closed-loop System / Robot Simulation Software / Computer Vision / Object Detection / Safety Protocols / Regulatory Compliance / Risk Assessment / industrial robots / smart manufacturing / |
Subunit 6 - Consumer Appliances |
8.6.1. Heating Systems |
Thermostat / Zoning / Boiler / Heat Pump / Control Strategy / Sensors / Actuator / Energy Management System / Smart Thermostat / On/Off Control Systems / Proportional Control Systems / PID Control Systems / Industrial Heating / Industrial Heating / Energy Efficiency / On/Off Control Systems / Temperature Sensors / Heating Control System / |
8.6.2. Washing Machine Control Systems |
Washing Machine / Control Systems / Microcontroller / Sensors / Actuators / Actuator / Electric Motors / Solenoids / Pressure Sensor / Temperature Sensor / Load Sensor / Self-diagnosis / |
Subunit 7 - Transportation Systems |
8.7.1. GPS Navigation Systems |
GPS / Satellite / Navigation / Coordinates / Waypoints / Tracking / Accuracy / Mapping / Geocaching / Receiver / Global Positioning System / Trilateration / Satellite Constellation / Time Synchronization / Geolocation / Route planning / Location-based services / Fleet management / Surveying / Fitness tracking / Agricultural applications / |
8.7.3. Taxi Meters |
Fare calculation / Control Unit / GPS Integration / Mechanical Systems / Electronic Systems / GPS Integration / |
Unit 9 - Artificial Intelligence |
Subunit 1 - Artificial Intelligence |
9.1.1. Machine Learning |
|
9.1.11. Ethical Issues with AI & Machine Learning |
|
9.1.2. Expert Systems |
|
Unit 9 - Robotics |
Subunit 2 - Robotics |
9.2.10. Ethical Issues with robotics |
|
9.2.1. Industrial Robots |
Industrial Robots / Automation / End Effectors / Accuracy / Flexibility / Payload / safety measures / emergency stop / collision detection / risk assessment / occupational safety / Hazardous / Machine guarding / Safety training / Limited Accuracy / Lack of Flexibility / High Initial Costs / Complex Programming / Safety Concerns / Limited Task Variety / Maintenance and Downtime / Limited Decision-Making Ability / Welding / Painting / Pick-and-Place / Inspection / Material Handling / Machine Tending / Palletizing / Deburring / |
9.2.2. Domestic Robots |
|
9.2.3. Drones |
|