Unit 1 - ICT Devices

Subunit 1 - Categories of Digital Devices

Personal Computers Desktop Computer / Laptop Computer / All-in-One Computer / Workstation / Gaming PC / Tablet / Convertibles / Motherboard / Power Supply Unit (PSU) / Graphics Processing Unit (GPU) / Cooling System / Case / Display / Keyboard / Touchpad / Input Devices /
Mobile Devices Smartphone / Wearable / App / Operating System / Smartwatch / Touchscreen / Bluetooth / Fitness Tracker / Augmented Reality /
Mainframes Mainframe Computers / Batch Processing / Virtualization / Terminal / Parallel Processing / High Availability / Legacy System / Datacenter / Cluster Computing /
Supercomputers Supercomputers / Parallel processing / FLOPS / Cluster computing / Quantum computing / Exascale computing / Petascale / Grid computing / Distributed computing /
Embedded Devices Embedded devices / Microcontroller / Firmware / Real-time operating system (RTOS) / Sensor / Internet of Things (IoT) / Embedded software / Single-board computer /

Subunit 3 - Software

BIOS & MBR BIOS / MBR / Bootloader / UEFI / CMOS / Firmware / Partition / Primary Partition / Extended Partition / Logical Partition / Active Partition / Dual-Boot / GRUB / Partition Table / Disk Cloning / Disk Imaging / Sector / Head / Platter / Cylinder /
CLI, GUI & WIMP CLI / GUI / WIMP / terminal / shell / command / prompt / output / mouse / keyboard / menu / drag and drop / window / icon / scroll bar / tooltip / shortcut / file explorer / taskbar / control panel / remote access / RDP / SSH / Remote desktop / WYSIWYG / User Interface / Interface / multimedia / digital media / hypermedia /
Operating Systems Operating System / Multi-tasking / Multi-user / Kernel / Interrupt / Command Line Interface / Graphical User Interface / File System / Device Driver / Virtual Memory / Process / Thread / Deadlock / File Allocation Table (FAT) / Disk Defragmentation / File Compression / Encryption / System Call / Boot Loader / System Tray /
System / Utility Software Operating System / Utility Software / Compression Software / Backup Software / Disk Defragmenter / Anti-virus Software / Firewall Software / Spyware Removal Software / Data Recovery Software / Encryption Software / Debugging Software / Compiler / Interpreter / Device Driver / Registry Cleaner / System Restore / Task Manager / Disk Cleanup / System Information / File Manager / System Utility Software / Antivirus Software / Driver Updater / Uninstaller / File Compression Software /
Application Software Application Software / Operating System / Word Processing Software / Spreadsheet Software / Database Software / Presentation Software / Graphics Software / Web Browser / Email Software / Antivirus Software / Firewall Software / Backup Software / File Compression Software / Media Players / Virtualization Software / Project Management Software / Accounting Software / CRM Software / ERP Software / Desktop Publishing Software / educational software / interactive learning / adaptive learning / gamification / learning management system / simulation software / communication software / email / instant messaging / video conferencing / voice chat / web conferencing / screen sharing / virtual meetings / teleconferencing / entertainment software / video games / music streaming / movie streaming / virtual reality / game development /
Modelling Software Modelling software / 3D modelling / CAD software / Simulation software / Data modelling / Statistical modelling / Computer-aided engineering / Rendering software / animation software / keyframe / timeline / Mathematical Modeling Software /
User Interface Management Window Manager / Taskbar / Desktop Environment / Shell / Menu / Dock / Theme / GUI / Notification Center / Shortcut / Virtual Desktop / Accessibility Options /

Subunit 4 - Input Devices

Mice & Trackballs Trackball / Mouse / Ergonomics / Precision / Trackpad / Sensitivity / DPI /
Keyboards & Keypads Mechanical Keyboards / Membrane Keyboards / Keycap / Ergonomics / Wireless Keyboards / Function Keys / Backlit Keyboards / Keyboard / Keypad / Mechanical / Membrane / Numeric Keypad / Ergonomics / Key Travel /
Microphones
Digital Cameras
Scanners Flatbed Scanner / Sheet-fed Scanner / Handheld Scanner / 3D Scanner /

Subunit 5 - Output Devices

Monitors / Screens
Projectors Projector / Lamp Life / Throw Ratio / Home Theater / Interactive Projector /
Inkjet Printers Inkjet / Cartridge / DPI / Paper feed / Print head / Print speed / Bubblejet /
Laser Printers Laserjet / Toner / Resolution / Duplex Printing / Cartridge / Driver /
3D Printers Fused Deposition Modeling / Slicing Software / Filament / Resolution / Print Bed / Extruder / 3D Model / Support Structure / Layer Height / Post-Processing /
Laser cutters / engravers
Graph Plotters

Subunit 6 - Storage Devices

Magnetic Storage Devices Magnetic storage / Hard disk drive / Read/write head / Track / Sector / Platter / Disk controller / Magnetic tape / Tape drive / Backup / Archiving / Data retention / Data recovery / Data redundancy / Data mirroring / Redundant Array of Independent Disks / SATA (Serial ATA) / IDE / Solid-state drive /
Secondary Memory Primary memory / Secondary memory / Hard drive / SSD /
Optical Storage Devices Optical Storage Devices / CD-ROM / DVD / Blu-Ray / Read-only / Write-once / Rewritable / Sector / Track / Pit / Land / Laser / Optical Disc Drive / Reflectivity / Data Density / Rotational Speed / Access Time / Buffer / Caddy / Tray /
Electrical Storage Devices (SSD,Flash Drive) Electrical Storage Devices / SSD / Flash Drive / Storage / Energy / Data / Integrated Circuits / Portable / Flash Memory / Digital /
Cloud Storage Cloud Storage / Virtualization / Data Migration / Data Center / Data Redundancy / Cloud Service Provider / Security Protocols / Subscription Model / Data Encryption / Data Replication / Private Cloud / Public Cloud / Hybrid Cloud / Network Latency / Cloud Backup / Disaster Recovery / Cloud Availability / Cloud Scalability / Data Center Virtualization / Cloud Deployment Model /

Subunit 7 - RAM, ROM & Cache

RAM & Cache Cache Memory / Hits / Misses / RAM / Memory Module / Virtual Memory / Latency / Non-volatile Memory / Memory Management / Swap Space /
ROM (Read Only Memory) ROM / Firmware / Boot-up Sequence / Erasable Programmable ROM (EPROM) / Bootloader / Flashing tool / Bricking / ROM flashing /
Memory Performance Factors Memory Bandwidth / Latency / Clock Speed / Memory Type / Memory Size / Memory Hierarchy / Memory Controller / bus width / memory clock speed / bandwidth /

Subunit 7 - Digital Payment Systems

Online Payment Systems E-commerce / Payment Gateway / Cryptocurrency / Mobile Wallet / Fraud Prevention / Chargeback / Digital Currency / Two-Factor Authentication / Merchant Account / PayPal / Shopping Cart / Digital Wallet / Recurring Billing /
Third Party Payment Systems Merchant Account / Chargeback / Peer-to-Peer Payments / Alternative Payment Methods / Escrow Service / Fraud Prevention Tools /
Two-Factor Authentication Two-Factor Authentication / Authentication / Security Token / SMS Verification / Authenticator App / Biometric Authentication / One-Time Password (OTP) / Phishing / Password Strength / Account Recovery /
Bank Cards Debit Card / Credit Card / Contactless Payment / Chip Card / Magstripe Card / EMV / Mobile Wallet / Virtual Card / Magnetic Stripe / Card Reader / Fraud Prevention / Transaction Encryption / Card Skimming / Skimmer / PIN Capture / ATM Fraud /
Contactless Payment Systems NFC / Mobile Wallet / Payment Terminal / Contactless Card /

Subunit 8 - CPU, GPU & Motherboard

CPU, GPU & Motherboard Central Processing Unit / Microprocessor / Instruction Set / Clock Speed / Cache Memory / Pipeline / Multicore / CPU / heatsink / fan / thermal paste / overclocking / liquid cooling / finned heatsink / GPU / Parallel processing / Graphics memory / Ray tracing / VRAM / memory slots / expansion slots / Power connectors / Form factor / power supply unit /

Subunit 9 - Accessibilty

Accessibility & Inclusion Inclusion in Computing / Diversity / Equity / Underrepresented / Bias / Accessibility / Empowerment / Intersectionality / Growth Mindset / Allyship / Digital inclusion / Assistive technology / Web accessibility / Screen reader / Captioning / Inclusive design / Accessible Document Format / Alt Text / Tagged PDF / gender bias / gender gap / glass ceiling / equal opportunities / stereotype / work-life balance / mentorship / Harassment / Sexual Harassment / Microaggression / Digital divide / Technology gap / Internet inequality / Technological disparity / Access divide / Information divide / Connectivity gap / Digital literacy / Information literacy / Computer literacy / Internet literacy / Media literacy / Cybersecurity /

Unit 2 - Introduction to Networks

Subunit - Networks

Introduction to networking Networking / Router / Switch / IP Address / Protocol / LAN / WAN / Firewall / DNS / Ethernet /
Types of networks – LAN,WAN,PAN LAN / WAN / PAN / Network / Topology / Router / Switch / Firewall / IP Address / Packet / Bandwidth / Latency / Scalability / Quality of Service (QoS) / Traffic shaping / Internet of Things / Fitness Tracking / Wearable Devices / Smartwatches / Healthcare Monitoring / Personalized Entertainment / Smart Homes / Location Tracking / Mobile Payments / Encryption / WLAN / Wireless access point / SSID / Frequency band / Signal strength /
Client server vs Peer to Peer Client server / Peer to Peer / Server / Client / Centralized / Decentralized / Scalability / Reliability / Security / Efficiency / P2P network / File sharing / Distributed network / Resource sharing / Fault tolerance /
Network Speeds Network Speeds / Bandwidth / Latency / Ping / Download Speed / Upload Speed / Throughput / Jitter / Quality of Service (QoS) / Packet Loss /
Network Protocols TCP / UDP / HTTP / HTTPS / FTP / SMTP / POP3 / IMAP / SSH / NTP / DNS / DHCP / ARP / IPSEC / Network Protocol / Handshake / Standard / IPv4 / IPv6 / SSL/TLS /

Subunit - Internet & World Wide Web

Internet vs WWW Internet / WWW / Network / Browser / HTML / URL / ISP / HTTP / Download / Upload / instant messaging client / text messaging / file sharing / group chat / emoticons / presence status / email clients / inbox / spam / attachment / folders / cloud storage client / file syncing / automatic backup / offline access /
IP v4, IPv6 & MAC Addresses IPv4 / IPv6 / MAC Address / IP / Internet Protocol version 4 / Internet Protocol version 6 / Media Access Control Address / Network Interface / Data Link Layer / OSI Model / public IP / private IP / NAT / MAC Addresses / mac address spoofing /
HTTP, HTML, CSS & Javascript HTTP / HTML / URL / GET / POST / HTTP Response / Status Code / Header / Hyperlink / Tag / HTTP Cookie / Session Cookie / Persistent Cookie / Tracking Cookie / Selector / Value / embedded inline external CSS / style attribute / external CSS / stylesheet / cascade /
URLS, DNS & Address resolution URL / DNS / Address Resolution / Domain / IP Address / Top-Level Domain (TLD) / Hostname / Resolver / URL Encoding / Root DNS Server / subdomain / Host / Hierarchy / Parent Domain / Domain Registrar / Top level domain / Domain Name / DNS Resolver / DNS Record / TTL (Time to Live) / TLD (Top-Level Domain) / Authoritative Name Server /
Components of the World Wide Web World Wide Web / HTML / URL / HTTP / Web Browser / Hyperlink / Website / Web Server / CSS / JavaScript /

Subunit - Wired Network Hardware

Introduction to Wired Networks Wired Networks / Ethernet / LAN / Router / Switch / Cable / Fiber Optics / Bandwidth / CAT5e /
Servers servers / hosting / data center / virtualization / dedicated server / redundancy /
Switches Switch / Hub / Network Switch / MAC address table / MAC address / Physical port / Switching /
Routers Router / Firewall / Routing / IP Addressing / Network Address Translation (NAT) / Quality of Service (QoS) / Virtual Private Network (VPN) / Load Balancing / Packet Filtering /
Modems Modem /
Wired Network Transmission Media Ethernet Cable / Ethernet / bandwidth /
Network Interface Cards Network Interface Card (NIC) / Network interface controller / Ethernet / Full Duplex /

Subunit - Wireless Networks

Introduction to wireless networks Wireless Networks / Wireless Communication / Wi-Fi / Bluetooth / Mobile Network / Cellular Network / LAN / WAN / Signal Strength / Roaming / Satellite network / Mesh network / Ad hoc network / NFC /
Mobile communication standards wifi / router / hotspot / SSID / encryption / bandwidth / signal strength / access point / Authentication / Key / Vulnerability / Cracking / Internet of things / Sensors / Smart Home / Security /
Wireless Network Hardware NAT / Private IP / Public IP / LAN / Gateway / Router / IP Lease / dhcp / DHCP server / authentication / integrity / authentication protocol /
Wireless Network Encryption Wired Equivalent Privacy / Wi-Fi Protected Access / WPA2 / WPA3 /

Subunit - Network Security

Network validation & authentication Network validation / Authentication / Network security / Digital certificate / Biometric authentication / Access control / Two-factor authentication / Intrusion detection system / Firewall / Security audit / password authentication / credentials / authentication factor / hashing / salt / phishing / asymmetric encryption / symmetric encryption / public key / private key / key exchange / encryption / decryption / certificate authority / digital signature / certificate revocation / key pair /
Protecting networks Firewall / Antivirus / Intrusion Detection System / Encryption / Virtual Private Network / Two-factor authentication / Access control / Intrusion Prevention System / Vulnerability scanning / Security policy / Antivirus Software / Network Segmentation / network security audit / penetration testing / Acceptable Use Policy / User Agreement / Internet Usage Policy / incident response plan / mitigation /
Viruses computer virus / Antivirus / Trojan Horse / Worm / Ransomware /
Malware Malware / Virus / Trojan / Ransomware / Spyware / Adware / Worm / Rootkit / Keylogger / Phishing /
Spyware spyware /
Phishing Phishing / Spoofing / Two-factor authentication / Phishing website /
DDOS Attacks DDoS Attack / Zombie Computers / Amplification Attack / Packet Flooding /
Brute Force Attacks brute force attacks / dictionary attack /
SQL Injection Attacks SQL injection / Input sanitation /
Insider Threats Insider Threats / Privileged Access /
Social Engineering Social Engineering / Pretexting / Baiting / Tailgating / Impersonation / Spear Phishing /
Physical Network Attacks Physical system attacks / Eavesdropping / Tampering / Impersonation / Physical Tapping /
Botnets Botnet / Zombie Computers / Command and Control Server / Infected Devices / Bot Herders /

Subunit - Data Backup & Recovery

Causes of data loss Hardware Failure / Software Corruption / Malware Attacks / Human Error / Natural Disasters / Power Outages / Accidental Deletion / Network Failures / Inadequate Backup / Malware infections / Power Outage / Flood / Fire / Earthquake / Hurricane / Tornado / Lightning / Tsunami / Wildfire / Improper Data Handling / Phishing Attacks / Unauthorized Access / Data Breaches / Misconfiguration / Lack of Backup /
Consequences of data loss Data loss / Data breach / Financial impact / Reputation damage / Legal consequences / Operational disruption / Data recovery costs / Data privacy violations / Customer trust erosion / Regulatory non-compliance /
Preventing data loss Backup / Data Recovery / Encryption / Data Backup Plan / Data Integrity / Disaster Recovery / Version Control / Data Archiving / Redundancy / Automated Backups / RAID /
Error Checking parity bits / error detection / odd parity / even parity / error correction / redundancy / Parity blocks / Data integrity / Checksum / RAID / Fault tolerance / Striping / Parity calculation / Capacity Overhead / MD5 / CRC / echo check / Automatic Repeat Query / Retransmission / Feedback / Packet Loss / Acknowledgment / Timeout / Sequence Number / Check digit / Luhn algorithm /
Full, Incremental & Differential Backups Full Backup / Incremental Backup / Differential Backup / Backup / Storage Medium / Data Loss / Backup Time / Source /
Failover Systems Failover Systems / Redundancy / High Availability System / Automatic Failover / Hot Standby / Cold Standby /

Unit 4 - Online Commodities and facilities

Subunit 1 - Online Services

Shopping Systems E-commerce / Shopping Cart / Payment Gateway / User Interface / Product Catalog / Checkout Process / Inventory Management / Customer Reviews / Digital Marketing / Return Policy /
Ticket Booking Systems Booking Engine / Payment Gateway / User Interface / Reservation System / E-Ticket / Cancellation Policy / Mobile Optimization / Dynamic Pricing /
Online Banking Systems
Online Training & Education
Online Gaming
News & Information Resources
Online Auction Sites
Entertainment

Unit 7 - Living in an Online World

Subunit 1 - Individuals in an online world

Effects on health and well being Telemedicine / Health Apps / Online Health Communities / E-learning for Health Professionals / Health Information Systems / Digital Therapeutics / Remote Monitoring / Health Education Online / Digital addiction / Eye strain / Poor posture / Sleep disturbances / Isolation / Cyberbullying /
Data & Online Privacy Data / Online Privacy / Encryption / Cookies / Cybersecurity / Anonymity / Data Breach / Phishing / Digital Footprint / Privacy Policy / Data privacy / Security breach / Identity theft / Data breaches / Tracking / Consent / accuracy / retention / data protection laws / personal data / data subject / data controller / Data Minimization / Anonymization /

Subunit 2 - Society in an online world

Online Communities
Digital Divide
Accessibilty
Online Learning

Subunit 3 - Employment in an online world

Remote Working
Flexible Working
Impact of Artificial Intelligence

Subunit 4 - Impact on the environment

Impact of technology on the environment Environmental Impact / Technology / Society / Pollution / E-waste / Carbon footprint / Deforestation / Resource depletion / Digital divide / Greenwashing / Renewable energy / Energy efficiency / Green buildings / Eco-friendly transportation / Smart grid / Waste reduction / Precision agriculture / Environmental monitoring / Telecommuting / Habitat Loss / Species Extinction / Ecosystem / Fragmentation /

Subunit 5 - Legislation in an online world

Copyright Copyright / Intellectual Property / Fair Use / Plagiarism / Public Domain / Licensing / Exclusive Rights / Infringement / Patent / Exclusivity / Patent Application / Patent Maintenance / Patent Enforcement / Market Exclusivity / Software Patent / Patentability /
Computer Usage Laws Legal Considerations / Contract Law / Intellectual Property / Privacy Laws / Employment Law / Compliance / Tort Law / Cybersecurity / Consumer Protection / Corporate Governance / Software Copyright / Patents / Infringement / Trade Secret / Open Source / Invention / Fair Use / Freeware / Shareware / Proprietary / Commercial / Public domain / Trialware / End-user license agreement (EULA) / Site license / Software license / Open source license / Freeware license / Shareware license / Commercial license / Single user license / Multi-user license / Multi User License / Cybercrime Laws / Computer Fraud / Digital Forensics / Online Harassment / Ransomware / Identity Theft / Intellectual Property Laws / Copyright / Trademark / Patent / Creative Commons / Data Protection / Breach Notification / Consent / Cybersecurity Laws / Online Defamation / Cyberbullying / Social Media / Slander / Harassment / Trolling / Online Reputation Management / Anonymity / Impersonation / Domain Name Disputes / Cybersquatting / Uniform Domain-Name Dispute-Resolution Policy (UDRP) / DNS Hijacking /
Software Licence Types Licensing / Proprietary license / Open Source / Proprietary / Freeware / Shareware / Public Domain / Copyleft / GNU General Public License (GPL) / Commercial License / Proprietary License / Compiled Program / Permissive License / MIT License / Site License /

Subunit 6 - Information in an online world

Reliability of information
plagiarism
Finding information