Unit 1 - ICT Devices

Subunit 1 - Categories of Digital Devices

1.1.1. Personal Computers
Personal Computer Desktop Computers | Advantages of Desktop Computers | Disadvantages of Desktop Computers | Laptops | Advantages of Laptops | Disadvantages of Laptops | Tablet PCs | Advantages of Tablets | Disadvantages of Tablets |
Desktop Computer / Laptop Computer / All-in-One Computer / Workstation / Gaming PC / Tablet / Convertibles / Motherboard / Power Supply Unit (PSU) / Graphics Processing Unit (GPU) / Cooling System / Case / Display / Keyboard / Touchpad / Input Devices /
1.1.2. Mobile Devices
Mobile Devices Smartphones | Advantages of Smartphones | Disadvantages of Smartphones | Wearable Devices (Smartwatches, Fitness Trackers) |
Smartphone / Wearable / App / Operating System / Smartwatch / Touchscreen / Bluetooth / Fitness Tracker / Augmented Reality /
1.1.4. Mainframes
Mainframe Computers Processing Power | Scalability | Reliability and Availability | Security | Batch Processing | Transaction Processing | Virtualization | Legacy Compatibility |
Mainframe Computers / Batch Processing / Virtualization / Terminal / Parallel Processing / High Availability / Legacy System / Datacenter / Cluster Computing /
1.1.5. Supercomputers
Introduction to Supercomputers Introduction to Supercomputers | Key features of Supercomputers | Scientific Research | Weather Forecasting and Climate Modeling | Aerospace and Engineering | Energy and Environmental Science | Healthcare and Biomedicine | Financial Modeling and Risk Analysis | Cryptography and Cybersecurity |
Supercomputers / Parallel processing / FLOPS / Cluster computing / Quantum computing / Exascale computing / Petascale / Grid computing / Distributed computing /
1.1.6. Embedded Devices
Embedded Devices Embedded Devices | Microcontrollers | Embedded Device Characteristics | Smart Home Devices |
Embedded devices / Microcontroller / Firmware / Real-time operating system (RTOS) / Sensor / Internet of Things (IoT) / Embedded software / Single-board computer /

Subunit 3 - Software

1.3.1. BIOS & MBR
Introduction to BIOS & MBR Basic Input Output System (BIOS) | BIOS Chip | Master Boot Record (MBR) |
BIOS / MBR / Bootloader / UEFI / CMOS / Firmware / Partition / Primary Partition / Extended Partition / Logical Partition / Active Partition / Dual-Boot / GRUB / Partition Table / Disk Cloning / Disk Imaging / Sector / Head / Platter / Cylinder /
1.3.2. CLI, GUI & WIMP
Command Line Interfaces Command Line Interfaces | Text-Based | Commands | Scripting | Remote Access | Common Uses | Advantages of CLIs | Disadvantages of CLIs |
Graphical User Interfaces Graphical User Interfaces | Visual Elements | WYSIWYG (What You See Is What You Get) | Windows and Multitasking | Point-and-Click Interaction | Multimedia Support | Common Use Cases | Advantages of GUIs | Disadvantages of GUIs |
WIMP Interfaces WIMP Interfaces | Windows | Icons | Menus | Pointer |
CLI / GUI / WIMP / terminal / shell / command / prompt / output / mouse / keyboard / menu / drag and drop / window / icon / scroll bar / tooltip / shortcut / file explorer / taskbar / control panel / remote access / RDP / SSH / Remote desktop / WYSIWYG / User Interface / Interface / multimedia / digital media / hypermedia /
1.3.3. Operating Systems
Functions of Operating Systems Operating Systems | OS Kernel | Hardware Abstraction | Process and task management | Device Drivers | File system management | Memory Management | Device Management | Security | User Interface | Networking | Error Handling | Resource Allocation and Scheduling | System Configuration and Maintenance |
Operating System / Multi-tasking / Multi-user / Kernel / Interrupt / Command Line Interface / Graphical User Interface / File System / Device Driver / Virtual Memory / Process / Thread / Deadlock / File Allocation Table (FAT) / Disk Defragmentation / File Compression / Encryption / System Call / Boot Loader / System Tray /
1.3.4. System / Utility Software
System Utility Software Disk Cleanup and Maintenance Tools | Disk Defragmentation Software | System Optimization Tools | Antivirus and Anti-Malware Programs | Backup and Recovery Software | Data Encryption and Secure File Deletion | System Monitoring and Diagnostic Tools | Uninstaller Programs |
Operating System / Utility Software / Compression Software / Backup Software / Disk Defragmenter / Anti-virus Software / Firewall Software / Spyware Removal Software / Data Recovery Software / Encryption Software / Debugging Software / Compiler / Interpreter / Device Driver / Registry Cleaner / System Restore / Task Manager / Disk Cleanup / System Information / File Manager / System Utility Software / Antivirus Software / Driver Updater / Uninstaller / File Compression Software /
1.3.5. Application Software
Introduction to Application Software Application Software | Productivity Software | Graphics Software | Educational Software | Communication Software | Entertainment Software |
Application Software / Operating System / Word Processing Software / Spreadsheet Software / Database Software / Presentation Software / Graphics Software / Web Browser / Email Software / Antivirus Software / Firewall Software / Backup Software / File Compression Software / Media Players / Virtualization Software / Project Management Software / Accounting Software / CRM Software / ERP Software / Desktop Publishing Software / educational software / interactive learning / adaptive learning / gamification / learning management system / simulation software / communication software / email / instant messaging / video conferencing / voice chat / web conferencing / screen sharing / virtual meetings / teleconferencing / entertainment software / video games / music streaming / movie streaming / virtual reality / game development /
1.3.6. Modelling Software
Modelling Software 3D Modeling Software | CAD (Computer-Aided Design) Software | Geographic Information System Software | Simulation and Modeling Software | Animation Software | Mathematical Modeling Software |
Modelling software / 3D modelling / CAD software / Simulation software / Data modelling / Statistical modelling / Computer-aided engineering / Rendering software / animation software / keyframe / timeline / Mathematical Modeling Software /
1.3.7. User Interface Management
User Interface Management Introduction to OS User Interface Management | Window Management | Desktop Environment | Input Handling | Graphics Rendering | User Interface APIs | Accessibility Features | UI Customization | UI Performance Optimization | UI Security |
Window Manager / Taskbar / Desktop Environment / Shell / Menu / Dock / Theme / GUI / Notification Center / Shortcut / Virtual Desktop / Accessibility Options /

Subunit 4 - Input Devices

1.4.1. Mice & Trackballs
Mice & Trackballs Mouse | Advantages of Mice | Disadvantages of Mice | Trackballs | Advantages of Trackballs | Disadvantages of Trackballs |
Trackball / Mouse / Ergonomics / Precision / Trackpad / Sensitivity / DPI /
1.4.2. Keyboards & Keypads
Keyboards & Keypads Keyboards | Advantages of Keyboards | Disadvantages of Keyboards | Keypads | Advantages of Keypads | Disadvantages of Keypads |
Mechanical Keyboards / Membrane Keyboards / Keycap / Ergonomics / Wireless Keyboards / Function Keys / Backlit Keyboards / Keyboard / Keypad / Mechanical / Membrane / Numeric Keypad / Ergonomics / Key Travel /
1.4.4. Microphones
Microphones Dynamic Microphones | How a Dynamic Microphone Works | Advantages of Dynamic Microphones | Disadvantages of Dynamic Microphones | Condenser Microphones | How Condensor Microphones Work | Advantages of Condenser Microphones | Disadvantages of Condenser Microphones | Sound Cards |
1.4.4. Digital Cameras
Introduction to Digital Cameras Digital Cameras | Key Components of Digital Cameras | Advantages of Digital Cameras | Disadvantages of Digital Cameras | Compact Cameras | Bridge Cameras | DSLR Cameras (Digital Single-Lens Reflex) | Mirrorless Cameras |
1.4.5. Scanners
Scanners Flatbed Scanners | Advantages & Disadvantages of Flatbed Scanners | Handheld Scanners | Advantages and Disadvantages of Handheld Scanners | 3D Scanners | Advantages & Disadvantages of 3D Scanners | Sheet-Fed Scanners | Advantages & Disadvantages of Sheet-fed Scanners |
Flatbed Scanner / Sheet-fed Scanner / Handheld Scanner / 3D Scanner /

Subunit 5 - Output Devices

1.5.1. Monitors / Screens
1.5.2. Projectors
Projectors Introduction to Projectors | Common Usage | Advantages of Projectors | Types of Projector |
Projector / Lamp Life / Throw Ratio / Home Theater / Interactive Projector /
1.5.3. Inkjet Printers
Inkjet Printers Introduction to Inkjet Printers | Printing Process | Advantages of Inkjet Printers | Disadvantages of Inkjet Printers | Piezoelectric Inkjet | Thermal Inkjet (Bubble Jet) |
Inkjet / Cartridge / DPI / Paper feed / Print head / Print speed / Bubblejet /
1.5.5. Laser Printers
Laserjet Printers Introduction to Laserjet Printers | How LaserJet Printers Work | Advantages of LaserJet Printers | Disadvantages of LaserJet Printers |
Laserjet / Toner / Resolution / Duplex Printing / Cartridge / Driver /
1.5.6. 3D Printers
3D Printers Introduction to 3D Printers | 3D Printing Process | Fused Deposition Modeling (FDM) Printers | Stereolithography (SLA) Printers | Selective Laser Sintering (SLS) | Advantages of 3D Printing | Limitations of 3D Printers | Applications of 3D Printers |
Fused Deposition Modeling / Slicing Software / Filament / Resolution / Print Bed / Extruder / 3D Model / Support Structure / Layer Height / Post-Processing /
1.5.7. Laser cutters / engravers
1.5.8. Graph Plotters

Subunit 6 - Storage Devices

1.6.1. Magnetic Storage Devices
Introduction to Magnetic Storage Devices Hard Disk Drives (HDD) | Components of a HDD | Advantages of HDD Drives | Disadvantages of HDD Drives | Magnetic Tape Drives | Advantages of magnetic tape drives | Disadvantages of magnetic tape drives |
Magnetic storage / Hard disk drive / Read/write head / Track / Sector / Platter / Disk controller / Magnetic tape / Tape drive / Backup / Archiving / Data retention / Data recovery / Data redundancy / Data mirroring / Redundant Array of Independent Disks / SATA (Serial ATA) / IDE / Solid-state drive /
1.6.2. Secondary Memory
Secondary Memory Introduction to Secondary Memory | Why is Secondary Memory Important? | Primary vs Secondary Memory Characteristics | Sequential access storage devices | Example of sequential storage devices | Direct (Random) Access Storage Devices |
Primary memory / Secondary memory / Hard drive / SSD /
1.6.3. Optical Storage Devices
Introduction to Optical Storage Devices CD (Optical Storage Devices) | How Optical Storage Devices Wrod | Advantages of CDs | Disadvantages of CDs | Types of CDs | DVD (Optical Storage Devices) | Advantages of DVDs | Disadvantages of DVDs | Blu-ray (Optical Storage Devices) |
Optical Storage Devices / CD-ROM / DVD / Blu-Ray / Read-only / Write-once / Rewritable / Sector / Track / Pit / Land / Laser / Optical Disc Drive / Reflectivity / Data Density / Rotational Speed / Access Time / Buffer / Caddy / Tray /
1.6.4. Electrical Storage Devices (SSD,Flash Drive)
Introduction to Electrical Storage Devices (SSD,Flash Drive) Electrical Storage Devices (SSD, Flash Drive) | Programming (writing data) | Erasing | Read Operation | Multi-Level Cell (MLC) Storage | Solid-State Drives (SSD): | Advantages of SSD Drives | Disadvantages | Flash Drives (USB Drives) | SD cards |
Electrical Storage Devices / SSD / Flash Drive / Storage / Energy / Data / Integrated Circuits / Portable / Flash Memory / Digital /
1.6.5. Cloud Storage
Introduction to Cloud Storage Cloud Storage | Advantages of Cloud Storage | Disadvantages of Cloud Storage |
Cloud Storage / Virtualization / Data Migration / Data Center / Data Redundancy / Cloud Service Provider / Security Protocols / Subscription Model / Data Encryption / Data Replication / Private Cloud / Public Cloud / Hybrid Cloud / Network Latency / Cloud Backup / Disaster Recovery / Cloud Availability / Cloud Scalability / Data Center Virtualization / Cloud Deployment Model /

Subunit 7 - RAM, ROM & Cache

1.7.1. RAM & Cache
Cache Memory Cache Memory | Cache Hits & Misses | Pros & Cons of Cache Memory |
RAM RAM | Why do we need RAM? | When is RAM used? | Virtual Memory | Advantages of RAM | Disadvantages of RAM |
Cache Memory / Hits / Misses / RAM / Memory Module / Virtual Memory / Latency / Non-volatile Memory / Memory Management / Swap Space /
1.7.2. ROM (Read Only Memory)
ROM ROM (Read Only Memory) | Key Characteristics of ROM | ROM Chip Location | Applications of ROM | Types of ROM | Advantages of ROM |
ROM / Firmware / Boot-up Sequence / Erasable Programmable ROM (EPROM) / Bootloader / Flashing tool / Bricking / ROM flashing /
1.7.3. Memory Performance Factors
Memory Performance Factors Memory bandwidth | Memory Type | Clock Speed | Memory Channel Configuration | Memory Timings | Data Bus Width | Memory Controller Efficiency |
Memory Bandwidth / Latency / Clock Speed / Memory Type / Memory Size / Memory Hierarchy / Memory Controller / bus width / memory clock speed / bandwidth /

Subunit 7 - Digital Payment Systems

1.7.1. Online Payment Systems
Online Payment Systems Introduction to Online Payment Systems | How Online Payment Systems Work | Types of Online Payment Systems | Advantages of Online Payment Systems | Disadvantages of Online Payment Systems |
E-commerce / Payment Gateway / Cryptocurrency / Mobile Wallet / Fraud Prevention / Chargeback / Digital Currency / Two-Factor Authentication / Merchant Account / PayPal / Shopping Cart / Digital Wallet / Recurring Billing /
1.7.2. Third Party Payment Systems
Third Party Payment Systems Introduction to Third Party Payment Systems | What are Escrow services? | Popular Third-Party Payment Systems | Advantages of Third Party Payment Systems | Drawbacks of Third-Party Payment Systems |
Merchant Account / Chargeback / Peer-to-Peer Payments / Alternative Payment Methods / Escrow Service / Fraud Prevention Tools /
1.7.3. Two-Factor Authentication
Two-Factor Authentication Introduction to Two-Factor Authentication (2FA) | Common Methods of 2FA | Benefits of 2FA | Drawbacks of Two-Factor Authentication (2FA) |
Two-Factor Authentication / Authentication / Security Token / SMS Verification / Authenticator App / Biometric Authentication / One-Time Password (OTP) / Phishing / Password Strength / Account Recovery /
1.7.4. Bank Cards
Bank Cards Introduction to Bank Cards | Key Features of Bank Cards | Magnetic Swipe Cards | Key Features of Magnetic Swipe Cards | How They Work | Advantages of Magnetic Swipe Cards | Disadvantages of Swipe Cards | Swipe Card Skimming | How Skimming Works | Introduction to Chip and PIN | Key Features of Chip and PIN | How It Works | Benefits of Chip and PIN |
Debit Card / Credit Card / Contactless Payment / Chip Card / Magstripe Card / EMV / Mobile Wallet / Virtual Card / Magnetic Stripe / Card Reader / Fraud Prevention / Transaction Encryption / Card Skimming / Skimmer / PIN Capture / ATM Fraud /
1.7.5. Contactless Payment Systems
Contactless Payment Systems Introduction to Contactless Payment | Key Features of Contactless Payment | How It Works | Benefits of Contactless Payment | Types of Contactless Payment Devices |
NFC / Mobile Wallet / Payment Terminal / Contactless Card /

Subunit 8 - CPU, GPU & Motherboard

1.8.1. CPU, GPU & Motherboard
The CPU Instruction Execution | CPU Clock | Clock Speed | Cores | Cache Memory | Cooling and Power Management | Architecture and Instruction Set |
The GPU Graphics Rendering | Parallel Processing Power | General-Purpose Computing | High Memory Bandwidth | Integrated vs discrete graphics |
Motherboard Motherboard | Motherboard Slots | Form Factors | Power Supply Unit. |
Central Processing Unit / Microprocessor / Instruction Set / Clock Speed / Cache Memory / Pipeline / Multicore / CPU / heatsink / fan / thermal paste / overclocking / liquid cooling / finned heatsink / GPU / Parallel processing / Graphics memory / Ray tracing / VRAM / memory slots / expansion slots / Power connectors / Form factor / power supply unit /

Subunit 9 - Accessibilty

1.9.1. Accessibility & Inclusion
Disability Inclusion Digital Inclusion for those with disabilities | Accessible Websites and Apps | Captioning and Transcripts | Assistive Technologies | User Testing with People with Disabilities | Accessible Document Formats | Accessible Hardware and Devices | Policy and Regulation Compliance | Inclusive Design Practices |
The digital divide Introduction to the digital divide | Access to Technology | Internet Connectivity | Digital Literacy | Economic and Social Implications | Age Related Issues |
Gender Inclusion Promoting Female Inclusion in Technology | Equal Access to Education | Promoting STEM Education | Supportive Networks | Promoting Female Role Models | Diversity in Hiring | Equal Pay and Advancement Opportunities | Flexible Work Arrangements | Investment in Female-Led Startups | Addressing Workplace Harassment |
Inclusion in Computing / Diversity / Equity / Underrepresented / Bias / Accessibility / Empowerment / Intersectionality / Growth Mindset / Allyship / Digital inclusion / Assistive technology / Web accessibility / Screen reader / Captioning / Inclusive design / Accessible Document Format / Alt Text / Tagged PDF / gender bias / gender gap / glass ceiling / equal opportunities / stereotype / work-life balance / mentorship / Harassment / Sexual Harassment / Microaggression / Digital divide / Technology gap / Internet inequality / Technological disparity / Access divide / Information divide / Connectivity gap / Digital literacy / Information literacy / Computer literacy / Internet literacy / Media literacy / Cybersecurity /

Unit 2 - Introduction to Networks

Subunit - Networks

2..1. Introduction to networking
Introduction to networking Ancient Networks | Introduction to Computer networking | The first computer network | Advantages of Computer Networks | Advantages of Networking | Advantages of Networking | Drawbacks of Computer Networks | Drawbacks of Computer Networks |
Networking / Router / Switch / IP Address / Protocol / LAN / WAN / Firewall / DNS / Ethernet /
2..2. Types of networks – LAN,WAN,PAN
Local Area Network Introduction to LANs | Components of a LAN | Advantages of LANs | Wireless Local Area Network (WLAN) | Disadvantages of LANs |
Wide Area Network Introduction to WANs | Components of a WAN | Use cases for WANs | Advantages of WANs | Disadvantages of WANs |
PAN network Introduction to PANs | PAN Use cases | Advantages of PANs | Disadvantages of PANs |
LAN / WAN / PAN / Network / Topology / Router / Switch / Firewall / IP Address / Packet / Bandwidth / Latency / Scalability / Quality of Service (QoS) / Traffic shaping / Internet of Things / Fitness Tracking / Wearable Devices / Smartwatches / Healthcare Monitoring / Personalized Entertainment / Smart Homes / Location Tracking / Mobile Payments / Encryption / WLAN / Wireless access point / SSID / Frequency band / Signal strength /
2..5. Client server vs Peer to Peer
Client - Server Model Introduction to the Client - Server Model | Clients | Servers | Advantages of the Client-Server Model | Disadvantages of the Client - Server Model |
Peer to Peer Model Introduction to Peer to peer model | Features of P2P Networks | Advantages of the P2P Model | Disadvantages of the P2P Model |
Client server / Peer to Peer / Server / Client / Centralized / Decentralized / Scalability / Reliability / Security / Efficiency / P2P network / File sharing / Distributed network / Resource sharing / Fault tolerance /
2..8. Network Speeds
Network Speeds Network Speeds | Upload Speed | Download Speed | Latency | Bandwidth |
Network Speeds / Bandwidth / Latency / Ping / Download Speed / Upload Speed / Throughput / Jitter / Quality of Service (QoS) / Packet Loss /
2..9. Network Protocols
Standards & Protocols Networking Standards | Standard Example: OSI Model (ISO/IEC 7498) | Network Protocols | Key Aspects of Protocols | Common Protocols | Importance of Protocols | Secure Protocols |
FTP File Transfer Protocol | Use Cases | Advantages of FTP | Disadvantages of FTP |
TCP vs UDP TCP (Transmission Control Protocol) | TCP Use Cases | UDP (User Datagram Protocol) | UDP Use Cases |
TCP / UDP / HTTP / HTTPS / FTP / SMTP / POP3 / IMAP / SSH / NTP / DNS / DHCP / ARP / IPSEC / Network Protocol / Handshake / Standard / IPv4 / IPv6 / SSL/TLS /

Subunit - Internet & World Wide Web

2..1. Internet vs WWW
Introduction to Internet vs WWW Internet vs WWW | Infrastructure Differences | Usage Differences | Protocol Differences |
Internet Software Web Browsers | Email Clients | Instant Messaging (IM) Clients | File sharing clients | Cloud Storage Clients | VOIP Clients |
Internet / WWW / Network / Browser / HTML / URL / ISP / HTTP / Download / Upload / instant messaging client / text messaging / file sharing / group chat / emoticons / presence status / email clients / inbox / spam / attachment / folders / cloud storage client / file syncing / automatic backup / offline access /
2..2. IP v4, IPv6 & MAC Addresses
IPv4 Introduction to IPv4 | IPv4 Addressing | Hierarchical Structure | Public IP Addresses | Private IP Addresses |
IPv6 Internet Protocol Version 6 | IPv6 Address Space | IPv6 Addressing |
MAC Addresses Introduction to MAC Addresses | MAC Address structure | MAC Address Assignment | MAC address spoofing |
IPv4 / IPv6 / MAC Address / IP / Internet Protocol version 4 / Internet Protocol version 6 / Media Access Control Address / Network Interface / Data Link Layer / OSI Model / public IP / private IP / NAT / MAC Addresses / mac address spoofing /
2..3. HTTP, HTML, CSS & Javascript
HTTP Introduction to HTTP | Client Server Model | HTTP Methods | Stateless Protcol | Cookies | HTTPS |
HTML Introduction to HTML | HTML Elements | Example HTML Page |
CSS Introduction to CSS | Selectors and Declarations | Example CSS Sheet | Inline Stylesheet | Embedded Stylesheet | External Stylesheet |
Javascript Introduction to Javascript | Example Script |
HTTP / HTML / URL / GET / POST / HTTP Response / Status Code / Header / Hyperlink / Tag / HTTP Cookie / Session Cookie / Persistent Cookie / Tracking Cookie / Selector / Value / embedded inline external CSS / style attribute / external CSS / stylesheet / cascade /
2..4. URLS, DNS & Address resolution
URLs Introduction to URLs | URL Components | URL Schemes | Subdomains | Domain Name | Top Level Domains | URL Ports | URL Path | URL Parameters | URL Fragments |
Domain Name System Domain Name System | How DNS Works |
URL / DNS / Address Resolution / Domain / IP Address / Top-Level Domain (TLD) / Hostname / Resolver / URL Encoding / Root DNS Server / subdomain / Host / Hierarchy / Parent Domain / Domain Registrar / Top level domain / Domain Name / DNS Resolver / DNS Record / TTL (Time to Live) / TLD (Top-Level Domain) / Authoritative Name Server /
2..5. Components of the World Wide Web
Introduction to Components of the World Wide Web Main title | Main title | JavaScript (Components of the World Wide Web) |
World Wide Web / HTML / URL / HTTP / Web Browser / Hyperlink / Website / Web Server / CSS / JavaScript /

Subunit - Wired Network Hardware

2..0. Introduction to Wired Networks
Introduction to wired networks Introduction to wired networks | Advantages of wired networks | Disadvantages of wired networks | Use cases for wired networks |
Wired Networks / Ethernet / LAN / Router / Switch / Cable / Fiber Optics / Bandwidth / CAT5e /
2..1. Servers
Server Introduction to servers | Types of server |
servers / hosting / data center / virtualization / dedicated server / redundancy /
2..2. Switches
Switch Switches | MAC table | MAC Addresses |
Switch / Hub / Network Switch / MAC address table / MAC address / Physical port / Switching /
2..3. Routers
Router Introduction to routers | Router functions | Routing table |
Router / Firewall / Routing / IP Addressing / Network Address Translation (NAT) / Quality of Service (QoS) / Virtual Private Network (VPN) / Load Balancing / Packet Filtering /
2..4. Modems
Modem Introduction to Modems | Types of Modems |
Modem /
2..5. Wired Network Transmission Media
Wired Network Transmission Media Introduction to Wired Networks | Types of wired networks | Coaxial Cable | Ethernet | Fiber Optic | Applications of Wired Networks | Advantages of Wired Networks | Disadvantages of wired networks |
Ethernet Cable / Ethernet / bandwidth /
2..7. Network Interface Cards
Network Interface Controller Network Interface Controllers (NICs) | Key Functions of a NIC | Types of NICs | NIC Features |
Network Interface Card (NIC) / Network interface controller / Ethernet / Full Duplex /

Subunit - Wireless Networks

2..0. Introduction to wireless networks
Introduction to wireless networks Introduction to wireless networks | Types of wireless networks | Applications of wireless networks | Advantages of wireless networks | Disadvantages of wireless networks |
Wireless Networks / Wireless Communication / Wi-Fi / Bluetooth / Mobile Network / Cellular Network / LAN / WAN / Signal Strength / Roaming / Satellite network / Mesh network / Ad hoc network / NFC /
2..11. Mobile communication standards
3G Introduction to 3G | Advantages of 3G | Disadvantages of 3G | Use cases for 3G |
4G 4G (Fourth Generation) Wireless Networks | Use cases for 4G | Advantages of 4G | Disadvantages of 4G |
5G 5G (Fifth Generation) Wireless Networks | Uses case for 5G | Advantages of 5G | Disadvantages of 5G |
WIFI Introduction to WIFI | WIFI range | WIFI Encryption | Advantages of WIFI | Disadvantages of WIFI |
Bluetooth Introduction to Bluetooth | Bluetooth use cases | Advantages of Bluetooth | Disadvantages of Bluetooth |
wifi / router / hotspot / SSID / encryption / bandwidth / signal strength / access point / Authentication / Key / Vulnerability / Cracking / Internet of things / Sensors / Smart Home / Security /
2..2. Wireless Network Hardware
Wireless Router Wireless Routers | Traffic Routing | Wireless Access Point | DHCP Server | Network Address Translation | Firewall | Port Forwarding | Quality of Service (QoS) |
Wireless Access Point Introduction to WAPs | SSID (Service Set Identifier) | Use cases for WAPs |
NAT / Private IP / Public IP / LAN / Gateway / Router / IP Lease / dhcp / DHCP server / authentication / integrity / authentication protocol /
2..14. Wireless Network Encryption
Wireless Encryption Standards WEP (Wired Equivalent Privacy) | WPA (Wi-Fi Protected Access) | WPA2 (Wi-Fi Protected Access 2) | WPA3 (Wi-Fi Protected Access 3) |
Wired Equivalent Privacy / Wi-Fi Protected Access / WPA2 / WPA3 /

Subunit - Network Security

2..1. Network validation & authentication
Password based authentication Introduction to password authentication | Password Hashing | Password Vulnerabilities | Strong passwords | Two-Factor Authentication (2FA) |
Digital Certificates Introduction to digital certificates | Public & Private Keys | Key Exchange | Certificate Authorities. | Diffie-Hellman |
Whitelisting & Blacklisting
Network validation / Authentication / Network security / Digital certificate / Biometric authentication / Access control / Two-factor authentication / Intrusion detection system / Firewall / Security audit / password authentication / credentials / authentication factor / hashing / salt / phishing / asymmetric encryption / symmetric encryption / public key / private key / key exchange / encryption / decryption / certificate authority / digital signature / certificate revocation / key pair /
2..3. Protecting networks
Protecting Networks Firewalls | IDS & IPS | Access Control | Encryption | Patch Management | Network Segmentation | Security Policies | Network Monitoring | Incident Response Plan | Regular Auditing and Testing | Backup and Disaster Recovery | Security Updates and Threat Intelligence |
Firewall / Antivirus / Intrusion Detection System / Encryption / Virtual Private Network / Two-factor authentication / Access control / Intrusion Prevention System / Vulnerability scanning / Security policy / Antivirus Software / Network Segmentation / network security audit / penetration testing / Acceptable Use Policy / User Agreement / Internet Usage Policy / incident response plan / mitigation /
2..1. Viruses
Viruses Viruses | Defending against viruses |
computer virus / Antivirus / Trojan Horse / Worm / Ransomware /
2..1. Malware
Malware Malware | Types of Malware |
Malware / Virus / Trojan / Ransomware / Spyware / Adware / Worm / Rootkit / Keylogger / Phishing /
2..1. Spyware
Spyware Introduction to Spyware | Defense Against Spyware |
spyware /
2..1. Phishing
Phishing Introduction to Phishing | Defense aginst Phishing |
Phishing / Spoofing / Two-factor authentication / Phishing website /
2..1. DDOS Attacks
DDOS Attacks Introduction to DDoS Attacks | Defense Against DDoS Attacks |
DDoS Attack / Zombie Computers / Amplification Attack / Packet Flooding /
2..1. Brute Force Attacks
Brute Force Attacks Introduction to Brute Force Attacks | Defence against brute force attacks |
brute force attacks / dictionary attack /
2..1. SQL Injection Attacks
SQL Injection Attacks SQL Injection | How SQL Injection Attacks Work | Preventing SQL Injection |
SQL injection / Input sanitation /
2..1. Insider Threats
Insider Threats Insider Threats | Types of insider threats | Mitigating Insider Threats |
Insider Threats / Privileged Access /
2..1. Social Engineering
Social Engineering Introduction to social engineering | Types of social engineering | Defence against social engineering attacks |
Social Engineering / Pretexting / Baiting / Tailgating / Impersonation / Spear Phishing /
2..1. Physical Network Attacks
Physical Network Attacks Physical System Attacks | Types of physical attacks | Defense against physical attacks |
Physical system attacks / Eavesdropping / Tampering / Impersonation / Physical Tapping /
2..1. Botnets
Botnets Introduction to Botnets | Botnet Distributed Denial of Service (DDoS) Attacks | Botnet Spam Distribution | Botnet Credential Theft | Botnet Click Fraud | Botnet Proxy Services | Botnet Data Theft | Botnet Cryptojacking |
Botnet / Zombie Computers / Command and Control Server / Infected Devices / Bot Herders /

Subunit - Data Backup & Recovery

2..1. Causes of data loss
Causes of Data Loss Hardware Failure | Software Corruption | Human Error | Malware and Cyberattacks | Natural Disasters | Power Outages | Theft or Loss of Devices | Software or Firmware Updates | Outdated or Inadequate Backup Procedures | Environmental Factors |
Hardware Failure / Software Corruption / Malware Attacks / Human Error / Natural Disasters / Power Outages / Accidental Deletion / Network Failures / Inadequate Backup / Malware infections / Power Outage / Flood / Fire / Earthquake / Hurricane / Tornado / Lightning / Tsunami / Wildfire / Improper Data Handling / Phishing Attacks / Unauthorized Access / Data Breaches / Misconfiguration / Lack of Backup /
2..2. Consequences of data loss
Consequences of data loss Financial Loss | Reputation Damage | Legal and Regulatory Consequences | Operational Disruption | Loss of Intellectual Property | Impact on Decision Making | Emotional Impact |
Data loss / Data breach / Financial impact / Reputation damage / Legal consequences / Operational disruption / Data recovery costs / Data privacy violations / Customer trust erosion / Regulatory non-compliance /
2..3. Preventing data loss
Preventing Data Loss Regular Backups | Automated Backup Solutions | Multiple Backup Locations | Data Encryption | Access Controls | Data Loss Prevention (DLP) Software | Regular Software Updates and Patching | Employee Training and Awareness | Physical Security Measures | Disaster Recovery Planning |
Full, Incremental & Differential Backups
Backup / Data Recovery / Encryption / Data Backup Plan / Data Integrity / Disaster Recovery / Version Control / Data Archiving / Redundancy / Automated Backups / RAID /
2..1. Error Checking
Parity Bit Checks Parity Checks | Even Parity | Parity Bit Demonstration | Odd Parity | Use cases for parity bits | Advantages of Parity Bits | Limitations of Parity Bits |
Checksums Checksum Calculation Process | Checksum Calculation Demonstration | Checksum Use cases | Advantages of Checksums | Limitations of Checksums |
Echo Check Echo Check |
Automatic Repeat Query (ARQ) Automatic Repeat Query (ARQ) | The Stop and Wait ARQ | Go back & ARQ | Selective Repeat ARQ |
Check Digits Check Digits | Luhn’s Algorithm | Check Digit Use Cases |
Parity Block Parity Block Checks | Interactive Demonstration | Block Parity Use Cases | Advantages of Parity Blocks | Limitations of Parity Blocks |
parity bits / error detection / odd parity / even parity / error correction / redundancy / Parity blocks / Data integrity / Checksum / RAID / Fault tolerance / Striping / Parity calculation / Capacity Overhead / MD5 / CRC / echo check / Automatic Repeat Query / Retransmission / Feedback / Packet Loss / Acknowledgment / Timeout / Sequence Number / Check digit / Luhn algorithm /
2..5. Full, Incremental & Differential Backups
Full, Incremental & Differential Backups Full Backup | Restoring Full Backups | Pros & Cons for Full Backups | Incremental Backup | Restoring from Incremental Backup | Pros & Cons of Incremental Backups | Differential Backup | Restoring Differential Backups | Pros and Cons of Differential Backups |
Full Backup / Incremental Backup / Differential Backup / Backup / Storage Medium / Data Loss / Backup Time / Source /
2..7. Failover Systems
Failover Systems Introduction to Failover Systems | Redundancy | Monitoring and Detection | Automatic Failover | Manual Intervention | Load Balancing | Data Replication and Synchronization | Testing and Validation |
Failover Systems / Redundancy / High Availability System / Automatic Failover / Hot Standby / Cold Standby /

Unit 4 - Online Commodities and facilities

Subunit 1 - Online Services

4.1.1. Shopping Systems
Online Shopping Introduction to Online Shopping Systems | Key Features of Online Shopping Systems | Benefits of Online Shopping Systems | Drawbacks of Online Shopping |
E-commerce / Shopping Cart / Payment Gateway / User Interface / Product Catalog / Checkout Process / Inventory Management / Customer Reviews / Digital Marketing / Return Policy /
4.1.2. Ticket Booking Systems
Online Ticket Booking Systems Booking Systems | Step 1- The search screen | Step 2 -The select screen | Step 3 – Review, Finalise and Pay Screen | Step 4 – The booking confirmation screen | Advantages of online booking systems | Disadvantages of Online Booking Systems |
Booking Engine / Payment Gateway / User Interface / Reservation System / E-Ticket / Cancellation Policy / Mobile Optimization / Dynamic Pricing /
4.1.3. Online Banking Systems
4.1.4. Online Training & Education
4.1.5. Online Gaming
4.1.6. News & Information Resources
4.1.7. Online Auction Sites
4.1.8. Entertainment

Unit 7 - Living in an Online World

Subunit 1 - Individuals in an online world

7.1.1. Effects on health and well being
Positive Effects of ICT on health and wellbeing Access to Health Information | Health Monitoring | Mental Health Support | Work Flexibility |
Negative Effects of ICT on health and wellbeing Sedentary Lifestyle | Eye Strain | Sleep Disruption | Mental Health Issues | Repetitive Strain Injuries (RSI) |
Telemedicine / Health Apps / Online Health Communities / E-learning for Health Professionals / Health Information Systems / Digital Therapeutics / Remote Monitoring / Health Education Online / Digital addiction / Eye strain / Poor posture / Sleep disturbances / Isolation / Cyberbullying /
7.1.2. Data & Online Privacy
Privacy Concerns Data Collection and Profiling | Surveillance | Eroding Privacy Norms | Right to be forgotten | Data privacy breaches | Data Protection Laws |
Data Protection Laws Data protection laws | Data Collection and Consent | Data Minimization | Data Security | Data Accuracy | Data Portability | Data Access and Transparency | Data Retention | Accountability and Governance | Penalties and Enforcement | Example Data Protection Laws |
Data / Online Privacy / Encryption / Cookies / Cybersecurity / Anonymity / Data Breach / Phishing / Digital Footprint / Privacy Policy / Data privacy / Security breach / Identity theft / Data breaches / Tracking / Consent / accuracy / retention / data protection laws / personal data / data subject / data controller / Data Minimization / Anonymization /

Subunit 2 - Society in an online world

7.2.1. Online Communities
7.2.2. Digital Divide
7.2.3. Accessibilty
7.2.4. Online Learning

Subunit 3 - Employment in an online world

7.3.1. Remote Working
7.3.2. Flexible Working
7.3.3. Impact of Artificial Intelligence

Subunit 4 - Impact on the environment

7.4.1. Impact of technology on the environment
Positive Environmental Impact of Technology Positive Impacts of technology on the environment | Renewable Energy Sources | Energy Efficiency | Waste Reduction | Environmental Monitoring | Precision Agriculture | Clean Transportation | Eco-Friendly Building Materials | Remote Work and Telecommuting | Water Conservation | Conservation and Restoration |
Negative Environmental Impact of Technology Negative Consequences for the Environment | Resource Depletion | Energy Consumption | E-Waste | Deforestation | Pollution | Loss of Biodiversity & Habitat | Climate Change | Sedentary Lifestyle | Mental Health |
Environmental Impact / Technology / Society / Pollution / E-waste / Carbon footprint / Deforestation / Resource depletion / Digital divide / Greenwashing / Renewable energy / Energy efficiency / Green buildings / Eco-friendly transportation / Smart grid / Waste reduction / Precision agriculture / Environmental monitoring / Telecommuting / Habitat Loss / Species Extinction / Ecosystem / Fragmentation /

Subunit 5 - Legislation in an online world

7.5.1. Copyright
Copyright Software Copyright | Derivative Works | Software Documentation | Anti-piracy techniques | Software Licensing | Copyright |
Introduction to Patents Overview of Patents | Patent Application Process | Key Features of Patents | Advantages of Patents | Disadvantages of Patents | Software Patents | Hardware Patents | Ethical Issues Surrounding Patents | The Impact of Patents on Technology Development | Review of Patents |
Copyright / Intellectual Property / Fair Use / Plagiarism / Public Domain / Licensing / Exclusive Rights / Infringement / Patent / Exclusivity / Patent Application / Patent Maintenance / Patent Enforcement / Market Exclusivity / Software Patent / Patentability /
7.5.2. Computer Usage Laws
Computer Usage Laws Cybercrime Laws | Data Protection and Privacy Laws | Intellectual Property Laws | Cybersecurity Laws | Online Defamation and Cyberbullying | Hate Speech and Content Regulation | Domain Name Disputes | CyberSquatting | Characteristics of Cybersquatting: |
Legal Considerations / Contract Law / Intellectual Property / Privacy Laws / Employment Law / Compliance / Tort Law / Cybersecurity / Consumer Protection / Corporate Governance / Software Copyright / Patents / Infringement / Trade Secret / Open Source / Invention / Fair Use / Freeware / Shareware / Proprietary / Commercial / Public domain / Trialware / End-user license agreement (EULA) / Site license / Software license / Open source license / Freeware license / Shareware license / Commercial license / Single user license / Multi-user license / Multi User License / Cybercrime Laws / Computer Fraud / Digital Forensics / Online Harassment / Ransomware / Identity Theft / Intellectual Property Laws / Copyright / Trademark / Patent / Creative Commons / Data Protection / Breach Notification / Consent / Cybersecurity Laws / Online Defamation / Cyberbullying / Social Media / Slander / Harassment / Trolling / Online Reputation Management / Anonymity / Impersonation / Domain Name Disputes / Cybersquatting / Uniform Domain-Name Dispute-Resolution Policy (UDRP) / DNS Hijacking /
7.5.3. Software Licence Types
Software License Types Proprietary (Closed-Source) License | Proprietary (Closed-Source) License: Pros and Cons | Open Source License | Open Source License: Pros and Cons | Permissive License | Permissive License: Pros and Cons | Commercial License | Freeware | Shareware | Public Domain | A single-user license | Multi-User License | Site License | Multi-Seat License | Educational and Academic Licenses |
Licensing / Proprietary license / Open Source / Proprietary / Freeware / Shareware / Public Domain / Copyleft / GNU General Public License (GPL) / Commercial License / Proprietary License / Compiled Program / Permissive License / MIT License / Site License /

Subunit 6 - Information in an online world

7.6.1. Reliability of information
7.6.2. plagiarism
7.6.3. Finding information