Unit 1 - Computer Systems |
Subunit 1 - Planning / Installation |
1.1.1. Identifying the context |
Identifying the context of ICT Systems |
Identifying the Context of a new system | Aspects to consider | Physical Environment | Political & Cultural Environment | Organizational considerations | Individuals within the system | Existing System | Internal & External Constraints | Scope of the new system | Out of scope | |
Context / ICT System / Identifying / Physical environment / Political environment / Cultural environment / Social norms / In scope / Out of scope / Scope creep / Scope statement / Change request / Project constraints / Project objectives / users / stakeholders / end users / customers / clients / managers / shareholders / developers / designers / investors / Existing system / Legacy system / Paper based system / Migration / Digital transformation / Reliability / Accessibility / analog system / obsolete system / Internal constraints / External constraints / Resource constraints / Legal constraints / Market constraints / Technological constraints / Environmental constraints / Social constraints / Political constraints / Economic constraints / |
1.1.2. Change Management |
Change management |
Introduction to Change Management | The need for change management | Steps in the Change Management Process | |
Kotter Model for Change Management |
Steps in the Kotter Model | Create Urgency | Form a Powerful Coalition | Create a Vision for Change | Communicate the Vision | Anchor the Changes in Corporate Culture | Remove Obstacles | Create Short-term Wins | Build on the Change | |
Change management / Change agent / Change readiness / Change control / Change resistance / Kotter Model / Urgency / Guiding Coalition / Vision / Communication / Empowerment / Short-term Wins / Consolidation / Institutionalization / Resistance / |
1.1.3. Compatibility Issues |
Compatibility Issues With New ICT Systems |
Compatibility Issues with New ICT Systems | Hardware Compatibility | Hardware Questions | Software Compatibility | Software Questions | Data Format Compatibility | Data Format Questions | Interoperability Issues | Interoperability Questions | Security Vulnerabilities | Security Questions | User Training and Support | User Questions | |
Issues with Legacy Systems |
Legacy Systems | Compatibility Issues | Security Risks | Maintenance Costs | Limited Functionality | Regulatory Compliance | Reduced Productivity | Lack of technical Knowledge | |
Compatibility Issues / ICT Systems / New ICT Systems / Compatibility / Integration / Conflicts / Software / Hardware / Networks / Upgrades / Interoperability / Legacy Systems / Integration Problems / Software Incompatibility / Hardware Incompatibility / Data Migration Challenges / Upgrading Problems / Testing and Quality Assurance / middleware / compatibility layer / mitigate / API gateway / backward compatibility / Technical Debt / Limited Scalability / Obsolete Hardware / Lack of Support / Compliance Risks / |
1.1.3. Methods of Testing |
Methods of testing |
Walkthrough Testing | White Box Testing | Black Box Testing | Unit Testing | Integration Testing | Alpha Testing | Beta Testing | Acceptance Testing | Stub Testing | |
Unit Testing / Integration Testing / System Testing / Acceptance Testing / Regression Testing / Black Box Testing / White Box Testing / Test Case / dry run testing / walkthrough testing / alpha testing / beta testing / stub testing / |
1.1.4. Local vs Remote Solutions |
Local vs Remote Solutions |
Local vs Remote Solutions | Local (On-Premises) Solutions | Remote (Cloud-Based) Solutions | Cost | Scalability and Flexibility | Security and Compliance | Performance and Reliability | Data Sovereignty and Privacy | Business Continuity and Disaster Recovery | Technical Expertise and Support | |
Software As A Service (SAAS) |
Introduction to SAAS | Subscription Model | Advantages of SAAS | Disadvantages of SAAS | |
Local System / Remote System / System Access / Latency / Bandwidth / Data Security / Data Privacy / Network Infrastructure / Scalability / Reliability / security / compliance / data sovereignty / confidentiality / availability / risk management / audit trail / Upfront cost / Operating cost / Capital expenditure / Operating expenditure / Total cost of ownership / Return on investment / Cost-benefit analysis / Depreciation / Lifecycle cost / Sunk cost / business continuity / disaster recovery / risk assessment / business impact analysis / emergency response plan / incident management / crisis communication / business resilience / Software as a Service / Cloud computing / Subscription-based model / On-demand software / Virtualization / Vendor lock-in / |
1.1.5. Choosing Test Data |
Choosing Test Data |
Choosing Test Data | Identify Test Cases | Use Realistic and Synthetic Data | Include Extreme and Edge Cases | Data Variety and Volume | Automatic Testing | |
Random sampling / Real-world data / Negative testing / Positive testing / Data completeness / Test Data / Boundary Values / Code Coverage / Ad-Hoc Testing / Pairwise Testing / Usability Testing / Test Coverage / |
1.1.6. System updates and maintenance |
System Updates and Maintenance |
Rolling release | Nightly Builds & Stable Build | Regular Maintenance Updates | Security Patches | Hard Release | Soft Release | |
Rolling release / Nightly build / Stable build / Hard release / Soft release / Incremental release / Continuous deployment / Alpha release / Beta release / Patch release / Build / Software release / Update / Source code / maintenance update / bug / performance improvement / new feature / patch / release notes / compatibility / rollback / system downtime / software update / Security Patch / Vulnerability / Zero-day Vulnerability / Exploit / Mitigation / |
1.1.6. Methods of Deployment |
Methods of System Deployment |
Methods of System Deployment | Pilot Running | Advantages of Pilot Running | Disadvantages of Pilot Running | Parallel Running | Advantages of Parallel Running | Disadvantages of Parallel Running | Direct Changeover | Advantages of Direct Changeover | Disadvantages of Direct Changeover | Phased Conversion | Advantages of Phased Conversion | Disadvantages of Phased Conversion | |
Parallel running / Pilot running / Direct changeover / Phased conversion / System implementation / Transition period / Risk mitigation / Operational overlap / User evaluation / Module-based implementation / |
Subunit 2 - System Design & Analysis |
1.2.6. End user Involvement |
Consequences of failing to involve end users in the design process |
Misalignment with User Needs | Poor User Experience | Wasted Resources | Decreased Competitiveness | Negative Impact on Brand Image | |
End users / Design process / User requirements / Feedback / Usability issues / Poor adoption rate / Wasted resources / Competitive disadvantage / Negative reputation / |
1.2.2. Obtaining Stakeholder Requirements |
Methods of Obtaining Stakeholder Requirements |
Interviews | Pros & Cons of Interviews | Surveys and Questionnaires | Pros & Cons of Surveys and Questionnaires | Focus Groups | Pros & Cons of Focus Groups | Workshops and Brainstorming Sessions | Pros & Cons of Workshops | Document Analysis | Document Analysis | Prototyping and Mock-ups | Pros & Cons of Prototyping and Mock-ups | Observation and Job Shadowing | Pros & Cons of Observation and Job Shadowing | |
Stakeholder / Requirement Elicitation / Interviews / Surveys / Observations / Prototyping / Focus Groups / Document Analysis / Brainstorming / Workshops / |
1.2.1. Identifying Stakeholders |
Internal Stakeholders |
Internal Stakeholders | IT Department | Management | End Users | Finance Department | Procurement | Training & Development Team | |
External Stakeholders |
Customers | Suppliers & Vendors | Partnerships | Investors & Shareholders | Competitors | Community & Society | Regulatory Authories | Industry Associations | |
Internal Stakeholders / Managers / Employees / IT Department / Executives / Finance Department / Human Resources / Project Managers / Technical Support / Quality Assurance / Shareholders / Customers / Suppliers / Government / Creditors / Competitors / Media / Regulators / Trade unions / |
1.2.3. Solution Design Research |
Solution Development Research |
Introduction to Solution Development Research | Literature Reviews | Current System | Organisational Capabilities | Data Analysis | Case Studies | Competitor Analysis | |
Literature Review / Technical research / Current system / Competitor analysis / Technical research / Case Study / |
1.2.4. Documenting System Requirements |
Methods of Documenting System Requirements |
In Scope Success Criteria | In-Scope Success Criteria - Hangman Game Example | Out of scope Success Criteria | Out-of-Scope Success Criteria - Hangman Game Example | Flowcharts | Use Case Diagrams | Pseudocode | Psuedocode - Hangman Game Example | Data Flow Diagrams (DFDs) | Entity-Relationship Diagrams (ERDs) | System Architecture Diagrams | Wireframes and Mockups | State Diagrams | Prototypes | User Stories | Data Dictionaries | Testing Tables | Requirements Traceability Matrix (RTM) | |
Use cases / Prototyping / entity relationship diagram / system architecture diagram / pseudocode / mockup / flowchart / In Scope / Out of Scope / Success Criteria / Scope Statement / Project Scope / Scope Creep / |
1.2.5. System Development Cycle |
System Design Cycle |
System Design Cycle | Requirements Gathering | System Analysis | System Design | Implementation | Testing | Deployment | Maintenance and Monitoring | Feedback and Iteration | |
System Design Cycle / Requirements Analysis / System Architecture / Prototyping / Implementation / Testing / Deployment / Maintenance / Feedback / Iteration / |
1.2.6. Software Development Models |
Software Development Models |
Waterfall Model | Pros of Waterfall Model | Cons of Waterfall Model | Use Cases of Waterfall Model | Spiral Mode | Pros of Spiral Model | Cons of Spiral Model | Use Cases for Spiral Model | Agile Model | Pros of Agile Model | Cons of Agile Model | Use Cases for Agile Model | |
Waterfall Model / Agile Model / Spiral Model / iterative model / incremental model / models / incremental / iterative / adaptability / collaboration / |
Subunit 3 - User Focus & Interaction |
1.3.1. Designing for usability |
System Usability |
Keep it simple | Use clear navigation | Be consistent | Use familiar design patterns | Optimise for mobile | Test your design | |
System usability / User interface / User experience / Learnability / Efficiency / Effectiveness / Satisfaction / Error prevention / Accessibility / Consistency / kiss approach / system design / simplicity / complexity / architecture / components / interfaces / requirements / constraints / |
1.3.1. User Focus |
Types of User Documentation |
User Manuals/Handbooks | Pros & Cons of Handbooks | Online Help Systems | Pros & Cons of Online Help Systems | Tutorials and Walkthroughs | Pros & Cons of Tutorials and Walkthroughs | FAQs (Frequently Asked Questions) | Pros & Cons of FAQs | Video Demos and Screencasts | Pros & Cons of Video Demos | In-App Guidance and Tooltips | Pros & Cons of In-App Guidance and Tooltips | Community Forums and Knowledge Bases | Pros & Cons of Community Forums and Knowledge Bases | |
User Manual / Quick Start Guide / Online Help / Tutorial / FAQs / Troubleshooting Guide / Installation Guide / Release Notes / Glossary / Training Materials / tooltip / context / visual cues / Knowledge Base / |
1.3.5. User Training |
Methods of Delivering User Training |
In-Person Training | Virtual Instructor-Led Training (VILT) | Self-Paced Online Courses | Webinars | On-Site Workshops or Bootcamps | Train-the-Trainer Programs | Peer Learning and Mentoring | Documentation and Knowledge Bases | |
Training Manual / Instructor-led Training / E-learning / Simulation / Hands-on Training / On-the-Job Training / Webinar / Blended Learning / Mentoring / Workshop / Knowledge base / |
Subunit 4 - System Components |
1.4.1. Modular Systems |
Benefits of Modularity |
Ease of Design and Development | Improved Collaboration | Improved Scalability | Maintenance and Upgrades | Reuse and Compatibility | Flexibility and Adaptability | Risk Mitigation | Simplified Testing and Quality Assurance | Cost Efficiency & Reduced Time to market | |
Flexibility / Scalability / Reusability / Maintainability / Encapsulation / Testing / Collaboration / Fault Isolation / Interoperability / Modifiability / |
1.4.1. Key Components of an ICT System |
Key Components of an ICT System |
Hardware | Software | Data | People | Networks | Internet | Procedures | Security | Standards | Services | |
Hardware / Software / Network / Data / Operating System / Database / Server / Cloud Computing / User Interface / People / Procedures / Security / |
1.4.2. Computer Roles in ICT Systems |
Computer Roles in ICT Systems |
Client | Server | Peer | Router | Switch | Firewall | Gateway | Proxy | Terminal | Endpoint | |
Gateway / Router / Switch / client / server / peer / firewall / proxy / packet filtering / terminal / endpoint / |
Subunit 5 - System Backup |
1.5.4. Security, Privacy & Integrity of Data |
|
1.5.5. Online, Offline, Onsite & Offsite Backups |
Reasons for data backup |
Accidental Deletion | Data Corruption | Ransomware and Malware | Hardware and Software Upgrades | Natural Disasters | Theft and Physical Damage | Archiving and Version Control | Regulatory Compliance | |
Onsite vs Offsite Backups |
Backup Location | Backup Speed | Backup Security | Backup Cost | Backup Management | Backup Legislative compliance | |
Online vs Offline Backups |
Online Backups | Pros & Cons of Online Backups | Offline Backups | Pros & Cons of Offline Backups | |
Backup / Data loss / Disaster recovery / Incremental backup / Full backup / Differential backup / Off-site backup / On-site backup / Magnetic tape backup / Cloud backup / In-house backup / Third-party backup / Backup frequency / Backup retention / Backup verification / Virtual server backup / Physical server backup / Bare-metal restore / Backup compression / Backup encryption / Onsite backups / Offsite backups / Data redundancy / Backup validation / backup legislative compliance / compliance / audit trail / Online Backups / Offline Backups / Remote Server / Cloud-Based Storage / |
1.5.2. Causes of data loss |
Causes of Data Loss |
Hardware Failure | Software Corruption | Human Error | Malware and Cyberattacks | Natural Disasters | Power Outages | Theft or Loss of Devices | Software or Firmware Updates | Outdated or Inadequate Backup Procedures | Environmental Factors | |
Hardware Failure / Software Corruption / Malware Attacks / Human Error / Natural Disasters / Power Outages / Accidental Deletion / Network Failures / Inadequate Backup / Malware infections / Power Outage / Flood / Fire / Earthquake / Hurricane / Tornado / Lightning / Tsunami / Wildfire / Improper Data Handling / Phishing Attacks / Unauthorized Access / Data Breaches / Misconfiguration / Lack of Backup / |
1.5.2. Consequences of data loss |
Consequences of data loss |
Financial Loss | Reputation Damage | Legal and Regulatory Consequences | Operational Disruption | Loss of Intellectual Property | Impact on Decision Making | Emotional Impact | |
Data loss / Data breach / Financial impact / Reputation damage / Legal consequences / Operational disruption / Data recovery costs / Data privacy violations / Customer trust erosion / Regulatory non-compliance / |
1.5.5. Full, Incremental & Differential Backups |
Full, Incremental & Differential Backups |
Full Backup | Restoring Full Backups | Pros & Cons for Full Backups | Incremental Backup | Restoring from Incremental Backup | Pros & Cons of Incremental Backups | Differential Backup | Restoring Differential Backups | Pros and Cons of Differential Backups | |
Full Backup / Incremental Backup / Differential Backup / Backup / Storage Medium / Data Loss / Backup Time / Source / |
1.5.8. Failover Systems |
Failover Systems |
Introduction to Failover Systems | Redundancy | Monitoring and Detection | Automatic Failover | Manual Intervention | Load Balancing | Data Replication and Synchronization | Testing and Validation | |
Failover Systems / Redundancy / High Availability System / Automatic Failover / Hot Standby / Cold Standby / |
Subunit 7 - Social, Ethical & Legal Considerations |
1.7.1. Environmental Concerns |
Positive Environmental Impact of Technology |
Positive Impacts of technology on the environment | Renewable Energy Sources | Energy Efficiency | Waste Reduction | Environmental Monitoring | Precision Agriculture | Clean Transportation | Eco-Friendly Building Materials | Remote Work and Telecommuting | Water Conservation | Conservation and Restoration | |
Negative Environmental Impact of Technology |
Negative Consequences for the Environment | Resource Depletion | Energy Consumption | E-Waste | Deforestation | Pollution | Loss of Biodiversity & Habitat | Climate Change | Sedentary Lifestyle | Mental Health | |
Environmental Impact / Technology / Society / Pollution / E-waste / Carbon footprint / Deforestation / Resource depletion / Digital divide / Greenwashing / Renewable energy / Energy efficiency / Green buildings / Eco-friendly transportation / Smart grid / Waste reduction / Precision agriculture / Environmental monitoring / Telecommuting / Habitat Loss / Species Extinction / Ecosystem / Fragmentation / |
1.7.2. Data & Online Privacy |
Privacy Concerns |
Data Collection and Profiling | Surveillance | Eroding Privacy Norms | Right to be forgotten | Data privacy breaches | Data Protection Laws | |
Data Protection Laws |
Data protection laws | Data Collection and Consent | Data Minimization | Data Security | Data Accuracy | Data Portability | Data Access and Transparency | Data Retention | Accountability and Governance | Penalties and Enforcement | Example Data Protection Laws | |
Data / Online Privacy / Encryption / Cookies / Cybersecurity / Anonymity / Data Breach / Phishing / Digital Footprint / Privacy Policy / Data privacy / Security breach / Identity theft / Data breaches / Tracking / Consent / accuracy / retention / data protection laws / personal data / data subject / data controller / Data Minimization / Anonymization / |
1.7.3. Inclusion in Computing |
Disability Inclusion |
Digital Inclusion for those with disabilities | Accessible Websites and Apps | Captioning and Transcripts | Assistive Technologies | User Testing with People with Disabilities | Accessible Document Formats | Accessible Hardware and Devices | Policy and Regulation Compliance | Inclusive Design Practices | |
The digital divide |
Introduction to the digital divide | Access to Technology | Internet Connectivity | Digital Literacy | Economic and Social Implications | Age Related Issues | |
Gender Inclusion |
Promoting Female Inclusion in Technology | Equal Access to Education | Promoting STEM Education | Supportive Networks | Promoting Female Role Models | Diversity in Hiring | Equal Pay and Advancement Opportunities | Flexible Work Arrangements | Investment in Female-Led Startups | Addressing Workplace Harassment | |
Inclusion in Computing / Diversity / Equity / Underrepresented / Bias / Accessibility / Empowerment / Intersectionality / Growth Mindset / Allyship / Digital inclusion / Assistive technology / Web accessibility / Screen reader / Captioning / Inclusive design / Accessible Document Format / Alt Text / Tagged PDF / gender bias / gender gap / glass ceiling / equal opportunities / stereotype / work-life balance / mentorship / Harassment / Sexual Harassment / Microaggression / Digital divide / Technology gap / Internet inequality / Technological disparity / Access divide / Information divide / Connectivity gap / Digital literacy / Information literacy / Computer literacy / Internet literacy / Media literacy / Cybersecurity / |
1.7.4. Professionalism in the world of IT |
IEEE Code of Ethics |
IEEE Software Engineering Code of Ethics | Rule 1 - Ensuring the safety of the public & the environment | Rule 2 – Educating individuals and society | Rule 3 – Avoiding conflicts of interest | Rule 4 – Avoiding unlawful conduct | Rule 5 – Being honest in claims and criticism | Rule 6 – Maintaining technical competence | Rule 7 – Avoiding discrimination | Rule 8 – Avoiding harassment | Rule 9 – Avoiding hurting others | Rule 10 – Supporting each other | |
Professionalism / Ethics / Accountability / Communication / Integrity / Confidentiality / Professional Development / Adaptability / Teamwork / Problem-solving / Objectivity / Competence / Fairness / Responsibility / Respect / Sustainability / harassment / whistleblower / reporting / discrimination / retaliation / code of conduct / whistleblower protection / moonlighting / conflict of interest / Continuing education / Certifications / Industry conferences / Online courses / Self-study / Mentorship / Professional networking / |
1.7.1. Computer Usage Laws |
Computer Usage Laws |
Cybercrime Laws | Data Protection and Privacy Laws | Intellectual Property Laws | Cybersecurity Laws | Online Defamation and Cyberbullying | Hate Speech and Content Regulation | Domain Name Disputes | |
Legal Considerations / Contract Law / Intellectual Property / Privacy Laws / Employment Law / Compliance / Tort Law / Cybersecurity / Consumer Protection / Corporate Governance / Software Copyright / Patents / Infringement / Trade Secret / Open Source / Invention / Fair Use / Freeware / Shareware / Proprietary / Commercial / Public domain / Trialware / End-user license agreement (EULA) / Site license / Software license / Open source license / Freeware license / Shareware license / Commercial license / Single user license / Multi-user license / Multi User License / Cybercrime Laws / Computer Fraud / Digital Forensics / Online Harassment / Ransomware / Identity Theft / Intellectual Property Laws / Copyright / Trademark / Patent / Creative Commons / Data Protection / Breach Notification / Consent / Cybersecurity Laws / Online Defamation / Cyberbullying / Social Media / Slander / Harassment / Trolling / Online Reputation Management / Anonymity / Impersonation / Domain Name Disputes / Cybersquatting / Uniform Domain-Name Dispute-Resolution Policy (UDRP) / DNS Hijacking / |
1.7.1. Copyright |
Copyright |
Introduction to Copyright | Software Copyright | Derivative Works | Software Patents | Software Documentation | Enforcement and Piracy | Software Licensing | |
Copyright / Intellectual Property / Fair Use / Plagiarism / Public Domain / Licensing / Exclusive Rights / Infringement / |
1.7.1. Software License Types |
Software License Types |
Proprietary (Closed-Source) License | Open Source License | Permissive License | Commercial License | Freeware | Shareware | Public Domain | A single-user license | Multi-User License | Site License | Educational and Academic Licenses | |
Licensing / Proprietary license / Open Source / Proprietary / Freeware / Shareware / Public Domain / Copyleft / GNU General Public License (GPL) / Commercial License / |
Unit 2.1 - Computer Architecture |
Subunit 1 - Computer Models |
2.1.1.1. Input-Process-Output Model |
Input Process Output Model |
Input Process Output Model | Input phase of IPO model | Process Phase of the IPO model | Output phase of the IPO Model | |
Input-Process-Output Model / Input / Process / Output / Data Flow / System / Model / Abstraction / Feedback / Control / |
2.1.1.2. Sequential, Parallel & Multi-agent Models |
Sequential Architecture |
Introduction to sequential computer architecture | Execution Flow | Advantages | Disadvantages | |
Parallel Architecture |
Introduction to parallel architecture | Execution | Use cases for parallel architecture | Advantages of parallel architecture | Disadvantages of parallel architecture | |
Multi-agent architecture |
Introduction to multi-agent architecture | Use cases for Multi-Agent Architecture | Advantages | Disadvantasges | |
Parallel algorithm / Sequential / Parallel / Multi-agent / Models / Task / Order / Simultaneously / Processors / Threads / Autonomous / |
2.1.1.3. Von Neumann Architecture |
Introduction to Von Neumann Architecture |
Introduction to the Von Neumann Architecture | Components of the Von Neumann Architecture | Central Processing Unit (CPU) | Memory (RAM) | Control Unit (CU) | Arithmetic Logic Unit (ALU) | Input/Output (I/O) System | Registers | System Busses | Data Bus | Address Bus | Control Bus | Program Counter (PC) | |
Von Neumann Registers |
Von Neumann Registers | Program Counter (PC) | Memory Address Register (MAR) | Memory Data Register (MDR) | Accumulator | Instruction Register (IR) | Index Registers | Stack Pointer (SP) | |
Von Neumann Architecture / Stored-Program Computer / Central Processing Unit / Memory / Instruction Fetch / Instruction Decode / Instruction Execution / Control Unit / Arithmetic Logic Unit (ALU) / Input/Output (I/O) / bus / control bus / data bus / address bus / register / accumulator / program counter / memory data register / memory address register / instruction register / system bus / |
2.1.1.4. Fetch – Execute Cycle |
Introduction to Fetch – Execute Cycle |
Introduction to the Fetch-Execute Cycle | Fetch | Fetch Stage Steps | Decode Phase | Decode Stage Steps | Execute Phase | Execute Phase Steps | |
Fetch / Execute / Cycle / Instruction / Memory / CPU / Step / Retrieve / Sequence / Carry out / Fetch-Decode-Execute Cycle / Decode / |
Subunit 2 - High & Low Level Languages |
2.1.2.1. High & Low Level Languages |
High Level Programming Languages |
High Level Programming Languages | Abstraction | Readability | Ease of Use | Rich Standard Libraries | Automatic Memory Management | Platform Independence | Limitations of High Level Languages | |
Low Level Programming Languages |
Low level programming languages | Direct Hardware Control | Efficiency | Manual Memory Management | Platform Specificity | Assembly-Level Programming | |
High-level language / Low-level language / Compiler / Interpreter / Assembly language / Machine language / Abstraction / Portability / Efficiency / Readability / |
2.1.2.2. Compilers, Interpreters, Assemblers & Translators |
Introduction to Compilers, Interpreters, Assemblers & Translators |
Compiler | Interpreter | Assembler | |
Compilation Process |
Compilation Process | 1. Preprocessing | 2. Compiling | 3. Assmembly | 4. Linking | The need for separate steps | |
Compiler / Interpreter / Assembler / Translator / Lexical Analysis / Syntax Analysis / Semantic Analysis / Code Generation / Optimization / Linker / |
Subunit 4 - Software |
2.1.4.1. BIOS & MBR |
Introduction to BIOS & MBR |
Basic Input Output System (BIOS) | BIOS Chip | Master Boot Record (MBR) | |
BIOS / MBR / Bootloader / UEFI / CMOS / Firmware / Partition / Primary Partition / Extended Partition / Logical Partition / Active Partition / Dual-Boot / GRUB / Partition Table / Disk Cloning / Disk Imaging / Sector / Head / Platter / Cylinder / |
2.1.4.2. CLI, GUI & WIMP |
Command Line Interfaces |
Command Line Interfaces | Text-Based | Commands | Scripting | Remote Access | Common Uses | Advantages of CLIs | Disadvantages of CLIs | |
Graphical User Interfaces |
Graphical User Interfaces | Visual Elements | WYSIWYG (What You See Is What You Get) | Windows and Multitasking | Point-and-Click Interaction | Multimedia Support | Common Use Cases | Advantages of GUIs | Disadvantages of GUIs | |
WIMP Interfaces |
WIMP Interfaces | Windows | Icons | Menus | Pointer | |
CLI / GUI / WIMP / terminal / shell / command / prompt / output / mouse / keyboard / menu / drag and drop / window / icon / scroll bar / tooltip / shortcut / file explorer / taskbar / control panel / remote access / RDP / SSH / Remote desktop / WYSIWYG / User Interface / Interface / multimedia / digital media / hypermedia / |
2.1.4.3. Operating Systems |
Functions of Operating Systems |
Operating Systems | OS Kernel | Hardware Abstraction | Process and task management | Device Drivers | File system management | Memory Management | Device Management | Security | User Interface | Networking | Error Handling | Resource Allocation and Scheduling | System Configuration and Maintenance | |
Operating System / Multi-tasking / Multi-user / Kernel / Interrupt / Command Line Interface / Graphical User Interface / File System / Device Driver / Virtual Memory / Process / Thread / Deadlock / File Allocation Table (FAT) / Disk Defragmentation / File Compression / Encryption / System Call / Boot Loader / System Tray / |
2.1.4.4. System / Utility Software |
System Utility Software |
Disk Cleanup and Maintenance Tools | Disk Defragmentation Software | System Optimization Tools | Antivirus and Anti-Malware Programs | Backup and Recovery Software | Data Encryption and Secure File Deletion | System Monitoring and Diagnostic Tools | Uninstaller Programs | |
Operating System / Utility Software / Compression Software / Backup Software / Disk Defragmenter / Anti-virus Software / Firewall Software / Spyware Removal Software / Data Recovery Software / Encryption Software / Debugging Software / Compiler / Interpreter / Device Driver / Registry Cleaner / System Restore / Task Manager / Disk Cleanup / System Information / File Manager / System Utility Software / Antivirus Software / Driver Updater / Uninstaller / File Compression Software / |
2.1.4.5. Application Software |
Introduction to Application Software |
Application Software | Productivity Software | Graphics Software | Educational Software | Communication Software | Entertainment Software | |
Application Software / Operating System / Word Processing Software / Spreadsheet Software / Database Software / Presentation Software / Graphics Software / Web Browser / Email Software / Antivirus Software / Firewall Software / Backup Software / File Compression Software / Media Players / Virtualization Software / Project Management Software / Accounting Software / CRM Software / ERP Software / Desktop Publishing Software / educational software / interactive learning / adaptive learning / gamification / learning management system / simulation software / communication software / email / instant messaging / video conferencing / voice chat / web conferencing / screen sharing / virtual meetings / teleconferencing / entertainment software / video games / music streaming / movie streaming / virtual reality / game development / |
2.1.4.6. Modelling Software |
Modelling Software |
3D Modeling Software | CAD (Computer-Aided Design) Software | Geographic Information System Software | Simulation and Modeling Software | Animation Software | Mathematical Modeling Software | |
Modelling software / 3D modelling / CAD software / Simulation software / Data modelling / Statistical modelling / Computer-aided engineering / Rendering software / animation software / keyframe / timeline / Mathematical Modeling Software / |
Subunit 5 - Secondary Storage Devices |
2.1.5.1. Magnetic Storage Devices |
Introduction to Magnetic Storage Devices |
Hard Disk Drives (HDD) | Components of a HDD | Advantages of HDD Drives | Disadvantages of HDD Drives | Magnetic Tape Drives | Advantages of magnetic tape drives | Disadvantages of magnetic tape drives | |
Magnetic storage / Hard disk drive / Read/write head / Track / Sector / Platter / Disk controller / Magnetic tape / Tape drive / Backup / Archiving / Data retention / Data recovery / Data redundancy / Data mirroring / Redundant Array of Independent Disks / SATA (Serial ATA) / IDE / Solid-state drive / |
2.1.5.2. Optical Storage Devices |
Introduction to Optical Storage Devices |
CD (Optical Storage Devices) | How Optical Storage Devices Wrod | Advantages of CDs | Disadvantages of CDs | Types of CDs | DVD (Optical Storage Devices) | Advantages of DVDs | Disadvantages of DVDs | Blu-ray (Optical Storage Devices) | |
Optical Storage Devices / CD-ROM / DVD / Blu-Ray / Read-only / Write-once / Rewritable / Sector / Track / Pit / Land / Laser / Optical Disc Drive / Reflectivity / Data Density / Rotational Speed / Access Time / Buffer / Caddy / Tray / |
2.1.5.3. Electrical Storage Devices (SSD,Flash Drive) |
Introduction to Electrical Storage Devices (SSD,Flash Drive) |
Electrical Storage Devices (SSD, Flash Drive) | Programming (writing data) | Erasing | Read Operation | Multi-Level Cell (MLC) Storage | Solid-State Drives (SSD): | Advantages of SSD Drives | Disadvantages | Flash Drives (USB Drives) | SD cards | |
Electrical Storage Devices / SSD / Flash Drive / Storage / Energy / Data / Integrated Circuits / Portable / Flash Memory / Digital / |
2.1.5.4. Cloud Storage |
Introduction to Cloud Storage |
Cloud Storage | Advantages of Cloud Storage | Disadvantages of Cloud Storage | |
Cloud Storage / Virtualization / Data Migration / Data Center / Data Redundancy / Cloud Service Provider / Security Protocols / Subscription Model / Data Encryption / Data Replication / Private Cloud / Public Cloud / Hybrid Cloud / Network Latency / Cloud Backup / Disaster Recovery / Cloud Availability / Cloud Scalability / Data Center Virtualization / Cloud Deployment Model / |
2.1.5.0. Secondary Memory |
Secondary Memory |
Introduction to Secondary Memory | Why is Secondary Memory Important? | Primary vs Secondary Memory Characteristics | Sequential access storage devices | Example of sequential storage devices | Direct (Random) Access Storage Devices | |
Primary memory / Secondary memory / Hard drive / SSD / |
Subunit 5 - Types of Computer |
2.1.5.1. Embedded Devices |
Embedded Devices |
Embedded Devices | Microcontrollers | Embedded Device Characteristics | Smart Home Devices | |
Embedded devices / Microcontroller / Firmware / Real-time operating system (RTOS) / Sensor / Internet of Things (IoT) / Embedded software / Single-board computer / |
2.1.5.1. Mainframes |
Mainframe Computers |
Processing Power | Scalability | Reliability and Availability | Security | Batch Processing | Transaction Processing | Virtualization | Legacy Compatibility | |
Mainframe Computers / Batch Processing / Virtualization / Terminal / Parallel Processing / High Availability / Legacy System / Datacenter / Cluster Computing / |
2.1.5.3. Supercomputers |
Introduction to Supercomputers |
Introduction to Supercomputers | Key features of Supercomputers | Scientific Research | Weather Forecasting and Climate Modeling | Aerospace and Engineering | Energy and Environmental Science | Healthcare and Biomedicine | Financial Modeling and Risk Analysis | Cryptography and Cybersecurity | |
Supercomputers / Parallel processing / FLOPS / Cluster computing / Quantum computing / Exascale computing / Petascale / Grid computing / Distributed computing / |
Subunit 7 - Primary Memory |
2.1.7.1. RAM & Cache |
Cache Memory |
Cache Memory | Cache Hits & Misses | Pros & Cons of Cache Memory | |
RAM |
RAM | Why do we need RAM? | When is RAM used? | Virtual Memory | Advantages of RAM | Disadvantages of RAM | |
Cache Memory / Hits / Misses / RAM / Memory Module / Virtual Memory / Latency / Non-volatile Memory / Memory Management / Swap Space / |
2.1.7.2. ROM (Read Only Memory) |
ROM |
ROM (Read Only Memory) | Key Characteristics of ROM | ROM Chip Location | Applications of ROM | Types of ROM | Advantages of ROM | |
ROM / Firmware / Boot-up Sequence / Erasable Programmable ROM (EPROM) / Bootloader / Flashing tool / Bricking / ROM flashing / |
Subunit 7 - Application Software |
2.1.7.1. Computer Aided Design Software (CAD) |
Computer Aided Design |
Introduction to CAD | CAD for Architecture | Mechanical Engineering | Automotive and Aerospace | Product Design | Benefits of CAD | |
CAD / 3D Modeling / Drafting / Rendering / Prototyping / Vector Graphics / Mesh / Simulation / CAM / Blueprint / Architectural plan / Engineering drawing / Scale drawing / Floor plan / Elevation drawing / Section drawing / |
Unit 2.2 - Data |
Subunit 1 - Binary & Hexadecimal |
2.2.1.1. Binary Numbers |
Introduction to binary numbers |
Introduction to Binary | Why Computers Use Binary: Reliability | Why Computers Use Binary: Ease of Storage | Why Computers Use Binary: Efficiency with Electrical Circuits | Why Computers Use Binary: Mathematical Operations | Bits, Nibbles, and Bytes | Encodings | |
Denary to Binary Conversion |
Denary to Binary Conversion | |
Binary to Denary Conversion |
Converting binary numbers to denary | |
Binary number / Base 2 / Bit / Nibble / Byte / Binary addition / Binary subtraction / Binary conversion / Binary coded decimal / Floating-point binary number / Encoding / |
2.2.1.2. Negative Numbers in Binary |
Sign & Magnitude |
Sign and Magnitude | Issues with Sign and Magnitude | |
Two's Complement |
Two's Complement | Advantages of Two's Complement | |
Two's complement / Negative Number / Binary Number / Sign Bit / Overflow / Magnitude / Ones Complement / Binary Representation / Sign and Magnitude / |
2.2.1.3. Hexadecimal |
Introduction to Hexadecimal |
Introduction to Hexadecimal | Converting hexadecimal to binary | Converting binary to hexadecimal | Binary to hexadecimal example | Common uses of Hexadecimal | Why do we use hexadecimal? | |
Hexadecimal / Base / Digits / Binary / Decimal / Conversion / Representation / Nibble / Byte / |
2.2.1.4. Binary Addition |
Introduction to Binary Addition |
Binary Addititon | Binary addition example | How do computers perform binary addition? | |
binary addition / binary / addition / bit / carry / overflow / half adder / full adder / binary arithmetic / |
2.2.1.5. Binary Shifts & Overflow |
Logical Binary Shifts |
Logical Left Shift (<<) | Left Logical Shift Example | Logical Right Shift (>>) | Right Logical Shift Example | |
Arithmetic Binary Shifts |
Arithmetic Right Shift | Arithmetic Right Shift - Example | Arithmetic Left Shift | Arithmetic Left Shift - Example | Interactive Demonstration | Summary Example - 10001010 (Shift 1) | |
Binary Overflow |
Binary Overflow | Example of Binary Overflow | Binary Underflow | |
Overflow / Binary shift / Binary Shifts / Shift Left / Shift Right / Logical Shift / Arithmetic Shift / Carry Bit / Shift Amount / Binary underflow / Binary arithmetic / Floating point / Machine precision / |
Subunit 2 - Data Representation |
2.2.2.1. ASCII & Unicode |
ASCII |
Introduction to ASCII | ASCII Table | Limitations of ASCII | |
Unicode |
Unicode | Unicode Bit Length | |
ASCII / Unicode / Character encoding / Code point / Character set / ASCII table / UTF-8 / UTF-16 / Binary representation / Bit / |
2.2.2.2. B&W Images |
Introduction to B&W Images |
Black & White Images | |
Black and White Images / Pixel / Binary Image / Monochrome / Contrast / Sharpness / Bitmap / Resolution / Bit Depth / File Format / |
2.2.2.3. Grayscale Images |
Introduction to Grayscale Images |
Greyscale Images | Adjust Grayscale Brightness | Uses for Grayscale Imagery | |
Grayscale image / Intensity / Monochrome / Luminosity / Histogram / Thresholding / Grayscale / Pixel / Bit Depth / Contrast / |
2.2.2.4. Color Images |
Introduction to Color Images |
RGB Color Images | RGB color demonstration | Bit Depth | Image Bit Depth Examples | |
RGB color model / hex code / color depth / additive color mixing / hex color code / Bit Depth / Pixel / 8-bit / 16-bit / 24-bit / |
2.2.2.5. Data Compression |
Lossless & Lossy Image Compression |
Image Compression | Calculating image sizes | Lossless Compression | Lossless Compression Techniques | Benefits of Lossless Compression | Drawbacks of lossless compression | Lossy Image Compression | Advantages of lossy compression | Image Compression Artifacts | Disadvantages of lossy compression | Common Compression Artifacts | |
Image Compression / Lossy Compression / Lossless Compression / JPEG / GIF / PNG / Bitrate / Entropy Coding / Compression / Data / Image compression artifacts / Blockiness / Color bleeding / Noise / Ring artifacts / Posterization / Aliasing / |
2.2.2.6. Sound Representation |
Introduction to Sound Representation |
Introduction to sound representation | Sampling Rate | Sampling Resolution (Bit Depth) | Lossy Sound Compression | Lossy sound compression techniques | |
How microphones work |
How dynamic microphones work | Advantages of Dynamic Microphones | Disadvantages of Dynamic Microphones | How condenser microphones work | Advantages of Condenser Microphones | Disadvantages of Condenser Microphones | |
Sound Representation / Audio Signal / Amplitude / Frequency / Waveform / Sampling Rate / Bit Depth / Digital Audio / Analog-to-Digital Conversion / Condenser microphone / Dynamic microphone / Frequency response / Phantom power / Diaphragm / |
2.2.2.8. Binary & Denary Prefixes |
Introduction to Binary & Denary Prefixes |
Denary Prefixes | Conversion between Binary and Denary (Binary & Denary Prefixes) | Binary & Denary comparison table | |
binary / denary / prefix / binary prefix / denary prefix / bit / byte / kibibyte / mebibyte / gibibyte / binary search / denary conversion / binary conversion / binary code / megabits / megabytes / |
2.2.2.9. Calculating file sizes |
Introduction to Calculating file sizes |
Calculating Image Sizes | |
|
2.2.2.9. Calculating Bit Depths |
Calculating Image Bit Depths |
Image Bit Depth | Standard Image Bit Depths | Importance of Bit Depth | Calculating Bit Depth for a Given Number of Colors | Example | Advantages of Higher Bit Depths | Disadvantages of Higher Bit Depths | |
Bit Depth / Color Depth / Quantization / Pixel / Resolution / |
Subunit 4 - Logic |
2.2.4.1. Logic Gates |
Introduction to Logic Gates |
Logic Gates | AND Gate | AND Gate Demo | OR Gate | OR Gate Demo | NOT Gate | NOT Gate Demo | XOR Gate | XOR Gate Demo | NAND Gate | NAND Gate Demo | NOR Gate | NOR Gate Demo | |
Logic Circuits |
Combing Logic gates into logic circuits | (NOT A) AND B | (A AND B) OR C | |
Logical operator / AND operator / OR operator / NOT operator / XOR operator / Logic Gates / AND Gate / OR Gate / NOT Gate / NAND Gate / NOR Gate / XOR Gate / XNOR Gate / Half Adder / Full Adder / |
Unit 3 - Networking |
Subunit 1 - Networks |
3.1.1. Introduction to networking |
Introduction to networking |
Ancient Networks | Introduction to Computer networking | The first computer network | Advantages of Computer Networks | Advantages of Networking | Advantages of Networking | Drawbacks of Computer Networks | Drawbacks of Computer Networks | |
Networking / Router / Switch / IP Address / Protocol / LAN / WAN / Firewall / DNS / Ethernet / |
3.1.2. Types of networks – LAN,WAN,PAN |
Local Area Network |
Introduction to LANs | Components of a LAN | Advantages of LANs | Wireless Local Area Network (WLAN) | Disadvantages of LANs | |
Wide Area Network |
Introduction to WANs | Components of a WAN | Use cases for WANs | Advantages of WANs | Disadvantages of WANs | |
PAN network |
Introduction to PANs | PAN Use cases | Advantages of PANs | Disadvantages of PANs | |
LAN / WAN / PAN / Network / Topology / Router / Switch / Firewall / IP Address / Packet / Bandwidth / Latency / Scalability / Quality of Service (QoS) / Traffic shaping / Internet of Things / Fitness Tracking / Wearable Devices / Smartwatches / Healthcare Monitoring / Personalized Entertainment / Smart Homes / Location Tracking / Mobile Payments / Encryption / WLAN / Wireless access point / SSID / Frequency band / Signal strength / |
3.1.3. Network Topologies |
Introduction to Network Topologies |
Network Topologies | Bus Topology | Star Topology | Ring Topology | Mesh Topology | Hybrid topology | |
Network Topologies / Bus Topology / Star Topology / Ring Topology / Mesh Topology / Tree Topology / Hybrid Topology / Client-Server Topology / Peer-to-Peer Topology / Fully Connected Topology / |
3.1.5. Client server vs Peer to Peer |
Client - Server Model |
Introduction to the Client - Server Model | Clients | Servers | Advantages of the Client-Server Model | Disadvantages of the Client - Server Model | |
Peer to Peer Model |
Introduction to Peer to peer model | Features of P2P Networks | Advantages of the P2P Model | Disadvantages of the P2P Model | |
Client server / Peer to Peer / Server / Client / Centralized / Decentralized / Scalability / Reliability / Security / Efficiency / P2P network / File sharing / Distributed network / Resource sharing / Fault tolerance / |
3.1.8. Network Speeds |
Network Speeds |
Network Speeds | Upload Speed | Download Speed | Latency | Bandwidth | |
Network Speeds / Bandwidth / Latency / Ping / Download Speed / Upload Speed / Throughput / Jitter / Quality of Service (QoS) / Packet Loss / |
3.1.9. Network Standards & Protocols |
Standards & Protocols |
Networking Standards | Standard Example: OSI Model (ISO/IEC 7498) | Network Protocols | Key Aspects of Protocols | Common Protocols | Importance of Protocols | Secure Protocols | |
FTP |
File Transfer Protocol | Use Cases | Advantages of FTP | Disadvantages of FTP | |
TCP vs UDP |
TCP (Transmission Control Protocol) | TCP Use Cases | UDP (User Datagram Protocol) | UDP Use Cases | |
TCP / UDP / HTTP / HTTPS / FTP / SMTP / POP3 / IMAP / SSH / NTP / DNS / DHCP / ARP / IPSEC / Network Protocol / Handshake / Standard / IPv4 / IPv6 / SSL/TLS / |
3.1.5. OSI Network Stack |
Data, Segments, Packets & Frames |
Data | Segments | Packets | Frames | |
Introduction to OSI Model |
Open Systems Interconnect Model | Application Layer (Layer 7) | Presentation Layer (Layer 6) | Session Layer (Layer 5) | Transport Layer (Layer 4) | Network Layer (Layer 3) | Data Link Layer (Layer 2) | Physical Layer (Layer 1) | |
Benefits of OSI Stack |
Standardization | Modularity | Interoperability | Troubleshooting | Education and Training | Documentation and Documentation Standards: | |
OSI Network Stack / Application Layer / Presentation Layer / Session Layer / Transport Layer / Network Layer / Data Link Layer / Physical Layer / Protocol / Layered Architecture / Standardization / Interchangeability / Reliability / Flexibility / Scalable Architecture / Integration / |
3.1.25. Virtual Private Networks |
Virtual Private Networks |
Virtual Private Networks | Remote Access VPN | Public Wi-Fi Security | Site to Site VPN | IP spoofing VPN | VPN Security Features | Advantages of VPNs | Disadvantages of VPNs | |
Virtual Private Network (VPN) / Tunneling / VPN Client / IPSec / Anonymity / Remote Access VPN / Site-to-Site VPN / IPSec VPN / PPTP / OpenVPN / VPN server / |
3.1.16. Storage Area Networks |
Storage Area Networks |
Storage Area Networks | Block Level Storage | Storage Devices | High Performance | Scalability | Data Redundancy | Data Management | Virtualization | |
Storage Area Networks / Fibre Channel / RAID / Snapshot / Storage Array / |
Subunit 2 - Wired Networks |
3.2.1. Wired Networks |
Introduction to wired networks |
Introduction to wired networks | Advantages of wired networks | Disadvantages of wired networks | Use cases for wired networks | |
Wired Networks / Ethernet / LAN / Router / Switch / Cable / Fiber Optics / Bandwidth / CAT5e / |
3.2.3. Switches |
Switch |
Switches | MAC table | MAC Addresses | |
Switch / Hub / Network Switch / MAC address table / MAC address / Physical port / Switching / |
3.2.4. Routers |
Router |
Introduction to routers | Router functions | Routing table | |
Router / Firewall / Routing / IP Addressing / Network Address Translation (NAT) / Quality of Service (QoS) / Virtual Private Network (VPN) / Load Balancing / Packet Filtering / |
3.2.5. Servers |
Server |
Introduction to servers | Types of server | |
servers / hosting / data center / virtualization / dedicated server / redundancy / |
3.2.6. Modems |
Modem |
Introduction to Modems | Types of Modems | |
Modem / |
3.2.7. Wired Network Transmission Media |
Wired Network Transmission Media |
Introduction to Wired Networks | Types of wired networks | Coaxial Cable | Ethernet | Fiber Optic | Applications of Wired Networks | Advantages of Wired Networks | Disadvantages of wired networks | |
Ethernet Cable / Ethernet / bandwidth / |
3.2.7. Network Interface Controller |
Network Interface Controller |
Network Interface Controllers (NICs) | Key Functions of a NIC | Types of NICs | NIC Features | |
Network Interface Card (NIC) / Network interface controller / Ethernet / Full Duplex / |
Subunit 3 - Wireless Networks |
3.3.1. Wireless Networks |
Introduction to wireless networks |
Introduction to wireless networks | Types of wireless networks | Applications of wireless networks | Advantages of wireless networks | Disadvantages of wireless networks | |
Wireless Networks / Wireless Communication / Wi-Fi / Bluetooth / Mobile Network / Cellular Network / LAN / WAN / Signal Strength / Roaming / Satellite network / Mesh network / Ad hoc network / NFC / |
3.3.3. Mobile communication standards |
3G |
Introduction to 3G | Advantages of 3G | Disadvantages of 3G | Use cases for 3G | |
4G |
4G (Fourth Generation) Wireless Networks | Use cases for 4G | Advantages of 4G | Disadvantages of 4G | |
5G |
5G (Fifth Generation) Wireless Networks | Uses case for 5G | Advantages of 5G | Disadvantages of 5G | |
WIFI |
Introduction to WIFI | WIFI range | WIFI Encryption | Advantages of WIFI | Disadvantages of WIFI | |
Bluetooth |
Introduction to Bluetooth | Bluetooth use cases | Advantages of Bluetooth | Disadvantages of Bluetooth | |
wifi / router / hotspot / SSID / encryption / bandwidth / signal strength / access point / Authentication / Key / Vulnerability / Cracking / Internet of things / Sensors / Smart Home / Security / |
3.3.2. Wireless Network Hardware |
Wireless Router |
Wireless Routers | Traffic Routing | Wireless Access Point | DHCP Server | Network Address Translation | Firewall | Port Forwarding | Quality of Service (QoS) | |
Wireless Access Point |
Introduction to WAPs | SSID (Service Set Identifier) | Use cases for WAPs | |
NAT / Private IP / Public IP / LAN / Gateway / Router / IP Lease / dhcp / DHCP server / authentication / integrity / authentication protocol / |
Subunit 4 - Internet & World Wide Web |
3.4.1. Internet vs WWW |
Introduction to Internet vs WWW |
Internet vs WWW | Infrastructure Differences | Usage Differences | Protocol Differences | |
Internet Software |
Web Browsers | Email Clients | Instant Messaging (IM) Clients | File sharing clients | Cloud Storage Clients | VOIP Clients | |
Internet / WWW / Network / Browser / HTML / URL / ISP / HTTP / Download / Upload / instant messaging client / text messaging / file sharing / group chat / emoticons / presence status / email clients / inbox / spam / attachment / folders / cloud storage client / file syncing / automatic backup / offline access / |
3.4.2. IP v4, IPv6 & MAC Addresses |
IPv4 |
Introduction to IPv4 | IPv4 Addressing | Hierarchical Structure | Public IP Addresses | Private IP Addresses | |
IPv6 |
Internet Protocol Version 6 | IPv6 Address Space | IPv6 Addressing | |
MAC Addresses |
Introduction to MAC Addresses | MAC Address structure | MAC Address Assignment | MAC address spoofing | |
IPv4 / IPv6 / MAC Address / IP / Internet Protocol version 4 / Internet Protocol version 6 / Media Access Control Address / Network Interface / Data Link Layer / OSI Model / public IP / private IP / NAT / MAC Addresses / mac address spoofing / |
3.4.3. HTTP, HTML, CSS & Javascript |
HTTP |
Introduction to HTTP | Client Server Model | HTTP Methods | Stateless Protcol | Cookies | HTTPS | |
HTML |
Introduction to HTML | HTML Elements | Example HTML Page | |
CSS |
Introduction to CSS | Selectors and Declarations | Example CSS Sheet | Inline Stylesheet | Embedded Stylesheet | External Stylesheet | |
Javascript |
Introduction to Javascript | Example Script | |
HTTP / HTML / URL / GET / POST / HTTP Response / Status Code / Header / Hyperlink / Tag / HTTP Cookie / Session Cookie / Persistent Cookie / Tracking Cookie / Selector / Value / embedded inline external CSS / style attribute / external CSS / stylesheet / cascade / |
3.4.4. URLS, DNS & Address resolution |
URLs |
Introduction to URLs | URL Components | URL Schemes | Subdomains | Domain Name | Top Level Domains | URL Ports | URL Path | URL Parameters | URL Fragments | |
Domain Name System |
Domain Name System | How DNS Works | |
URL / DNS / Address Resolution / Domain / IP Address / Top-Level Domain (TLD) / Hostname / Resolver / URL Encoding / Root DNS Server / subdomain / Host / Hierarchy / Parent Domain / Domain Registrar / Top level domain / Domain Name / DNS Resolver / DNS Record / TTL (Time to Live) / TLD (Top-Level Domain) / Authoritative Name Server / |
Subunit 5 - Network Security Threats |
3.5.1. Viruses |
Viruses |
Viruses | Defending against viruses | |
computer virus / Antivirus / Trojan Horse / Worm / Ransomware / |
3.5.1. Malware |
Malware |
Malware | Types of Malware | |
Malware / Virus / Trojan / Ransomware / Spyware / Adware / Worm / Rootkit / Keylogger / Phishing / |
3.5.1. Spyware |
Spyware |
Introduction to Spyware | Defense Against Spyware | |
spyware / |
3.5.1. Phishing |
Phishing |
Introduction to Phishing | Defense aginst Phishing | |
Phishing / Spoofing / Two-factor authentication / Phishing website / |
3.5.1. DDOS Attacks |
DDOS Attacks |
Introduction to DDoS Attacks | Defense Against DDoS Attacks | |
DDoS Attack / Zombie Computers / Amplification Attack / Packet Flooding / |
3.5.1. Brute Force Attacks |
Brute Force Attacks |
Introduction to Brute Force Attacks | Defence against brute force attacks | |
brute force attacks / dictionary attack / |
3.5.1. SQL Injection Attacks |
SQL Injection Attacks |
SQL Injection | How SQL Injection Attacks Work | Preventing SQL Injection | |
SQL injection / Input sanitation / |
3.5.1. Insider Threats |
Insider Threats |
Insider Threats | Types of insider threats | Mitigating Insider Threats | |
Insider Threats / Privileged Access / |
3.5.1. Social Engineering |
Social Engineering |
Introduction to social engineering | Types of social engineering | Defence against social engineering attacks | |
Social Engineering / Pretexting / Baiting / Tailgating / Impersonation / Spear Phishing / |
3.5.1. Physical Network Attacks |
Physical Network Attacks |
Physical System Attacks | Types of physical attacks | Defense against physical attacks | |
Physical system attacks / Eavesdropping / Tampering / Impersonation / Physical Tapping / |
3.5.1. Botnets |
Botnets |
Introduction to Botnets | Botnet Distributed Denial of Service (DDoS) Attacks | Botnet Spam Distribution | Botnet Credential Theft | Botnet Click Fraud | Botnet Proxy Services | Botnet Data Theft | Botnet Cryptojacking | |
Botnet / Zombie Computers / Command and Control Server / Infected Devices / Bot Herders / |
3.5.12. Symmetric & Asymmetric Encryption |
Symmetric Encryption |
Introduction to Symmetric Encryption | Key Generation | Encryption | Decryption | Key Distribution | Security Considerations | Use cases for Symmetric Encryption | |
Asymmetric Encryption |
Introduction to Asymmetric Encryption | Public - Private Key Pairs | Security | Speed | Common Asymmetric Encryption Standards | Use cases for Asymmetric Encryption | |
Symmetric Encryption / Key / Cipher / Block Cipher / Stream Cipher / Encryption / Decryption / AES / Asymmetric Encryption / Key Pair / RSA Algorithm / Digital Signature / Key Exchange / Secure Communication / Digital Signatures / Authentication / Confidentiality / Non-repudiation / Certificate Authority / Digital Certificate / Public Key / Private Key / Root Certificate / Revocation / |
Subunit 7 - Network Hardening Measures |
3.7.1. Network validation & authentication |
Password based authentication |
Introduction to password authentication | Password Hashing | Password Vulnerabilities | Strong passwords | Two-Factor Authentication (2FA) | |
Digital Certificates |
Introduction to digital certificates | Public & Private Keys | Key Exchange | Certificate Authorities. | Diffie-Hellman | |
Whitelisting & Blacklisting |
|
Network validation / Authentication / Network security / Digital certificate / Biometric authentication / Access control / Two-factor authentication / Intrusion detection system / Firewall / Security audit / password authentication / credentials / authentication factor / hashing / salt / phishing / asymmetric encryption / symmetric encryption / public key / private key / key exchange / encryption / decryption / certificate authority / digital signature / certificate revocation / key pair / |
3.7.3. Protecting networks |
Protecting Networks |
Firewalls | IDS & IPS | Access Control | Encryption | Patch Management | Network Segmentation | Security Policies | Network Monitoring | Incident Response Plan | Regular Auditing and Testing | Backup and Disaster Recovery | Security Updates and Threat Intelligence | |
Firewall / Antivirus / Intrusion Detection System / Encryption / Virtual Private Network / Two-factor authentication / Access control / Intrusion Prevention System / Vulnerability scanning / Security policy / Antivirus Software / Network Segmentation / network security audit / penetration testing / Acceptable Use Policy / User Agreement / Internet Usage Policy / incident response plan / mitigation / |
3.7.13. IPSec |
Internet Protocol Security |
IPsec (Internet Protocol Security) | Authentication Header (AH) | Encapsulating Security Payload (ESP) | Security Associations (SAs) | Key Management | IPsec Modes | Use Cases of IPsec | |
Internet Protocol Security / Authentication Header / Encapsulating Security Payload / Key Management Protocol / Transport Mode / Tunnel Mode / Security Association / Intrusion Detection System / Access Control List / |
3.7.13. Wireless Network Encryption |
Wireless Encryption Standards |
WEP (Wired Equivalent Privacy) | WPA (Wi-Fi Protected Access) | WPA2 (Wi-Fi Protected Access 2) | WPA3 (Wi-Fi Protected Access 3) | |
Wired Equivalent Privacy / Wi-Fi Protected Access / WPA2 / WPA3 / |
Unit 4.1 - Problem Solving & Algorithms |
Subunit 1 - Introduction to Algorithms |
4.1.1.1. Algorithms |
What are algorithms? |
Introduction to Algorithms | Examples of everyday algorithms | Thinking Algorithmically | Advantages of thinking algorithmically | Disadvantages of thinking algorithmically | |
Common types of algorithms |
Sorting Algorithms | Search Algorithms | Compression Algorithms | Divide and Conquer Algorithms | Encryption Algorithms | Graph Algorithms | |
Algorithm / Sorting / Searching / Divide and conquer / Encryption algorithm / Compression algorithm / Search algorithm / Sort algorithm / Iteration / Pattern recognition / Efficiency / Logical reasoning / |
4.1.1.2. Decomposition |
Decomposition |
Introduction to Decomposition | Benefits of Decomposition | Decomposition Steps | |
Decomposition / Modular programming / Abstraction / Top-down design / Hierarchy / Modularity / Bottom-up Processing / Divide and Conquer / Decentralization / Component / |
4.1.1.3. Flowcharts |
Introduction to flowcharts |
Introduction to Flowcharts | Example Flowchart | Flowchart Symbols | |
Flowchart / Process / Terminal Symbol / Decision Symbol / Process Symbol / Connector Symbol / Flowline / Input Symbol / Output Symbol / Loop Symbol / Iteration / Flowcharting Tool / |
4.1.1.4. Pseudocode, Program Code & Written Descriptions |
Introduction to pseudocode |
Introduction to Pseudocode | Pseudocode - pros & cons | Program Code - Pros & Cons | Flowcharts - Pros & Cons | |
Program Code |
Program Code | Executing Program Code | |
Written descriptions of algorithms |
Written descriptions | |
Psuedocode / Pseudocode / Program Code / Syntax / Flowchart / Variable / Control Structure / Loop / Conditional Statement / |
Subunit 3 - Searching & Sorting Algorithms |
4.1.3.1. Bubble Sort |
Introduction to Bubble Sort |
Introduction to Bubble Sort | Example | Pros and Cons of Bubble Sort | |
Bubble Sort / Comparison / Efficiency / Iteration / Swapping / In-place Sorting / Time Complexity / Space Complexity / Worst-Case Performance / Best-Case Performance / Average-Case Performance / Optimization / Element / Ascending Order / Descending Order / Stable sorting / |
4.1.3.2. Merge Sort |
Introduction to Merge Sort |
Introduction to Merge Sort | Steps of Merge Sort | Advantages of Merge Sort | Disadvantages of Merge Sort: | |
Merge Sort / Divide and conquer / Recursive / Merge / In-place sorting / Stable sort / Comparisons / Swaps / Time complexity / Best case / Average case / Worst case / Big-O notation / Space complexity / In-place merge sort / Recursion / Merge Function / Comparison-based Sort / In-place Sort / Out-of-place Sort / Linearithmic Time Complexity / Logarithmic Time Complexity / Quadratic Time Complexity / Pseudocode / |
4.1.3.3. Linear Search |
Linear Search |
Introduction to Linear Search | Time & Space Complexity | Pros and Cons of Linear Search | |
Sequential Search / Linear Search / List / Index / Search / Unordered / Comparison / Algorithm / Runtime / Complexity / Linear time complexity / Worst-case scenario / Best-case scenario / Average-case scenario / Efficiency / Big O notation / O(n) / Array / Element / Boolean / |
4.1.3.3. Binary Search |
Binary Search Algorithm |
Introduction to Binary Search | Pros and Cons of Binary Search | Binary Search Python Implementation | |
Binary Search / Sorted array / Divide and Conquer / Iteration / Search interval / Target element / Mid-point / Index / Comparison / Time complexity / Space complexity / Binary search tree / Balanced binary search tree / Height / Leaf / Node / Traversing / In-order traversal / Pre-order traversal / Post-order traversal / |
Subunit 4 - Decomposition & Abstraction |
4.1.4.1. Subprograms |
Subprograms |
Introduction to Subprograms | Functions | Procedures | Advantages of subprograms - Modularity | Advantages of subprograms - Reusability | Advantages of subprograms - Abstraction | Advantages of subprograms - Code organization | |
Subprogram / Function / Procedure / Return statement / Call statement / Modularity / Reusability / Maintainability / Abstraction / Testing / Readability / Efficiency / |
4.1.4.2. Abstraction |
Introduction to abstraction |
What is Abstraction? | Examples of Abstraction | Benefits of Abstraction | Abstraction in Programming | Abstraction - Car Example | |
Abstraction / Data abstraction / Abstract data type / Abstraction layer / Procedural abstraction / Class / Object / Encapsulation / Inheritance / Polymorphism / |
Unit 4.2 - Introduction to Programming |
Subunit 1 - Programming Fundamentals & Constructs |
4.2.1.1. Variables & Constants |
Variables & Constants |
Introduction to Variables | Declaring and Assigning Variables | Variable Naming Rules | Python Reserved Words | Built-in Functions | Sensible vs Not Sensible Variable Names | Constants | |
Variable / constant / data type / declaration / assignment / scope / global variable / local variable / type inference / |
4.2.1.2. Sequencing & Selection (If & switch statements) |
IF statements |
If Statements | Else | IF ELIF ELSE | Nested If Statement | |
Switch Statements |
Switch Statements | Switch statements < Python 3.10 | |
Sequencing / Selection / If statement / Switch statement / Condition / Boolean / Execution path / Nested if statement / Default case / |
4.2.1.3. Definite Iteration |
Definite Iteration - For Loops |
Definite Iteration - For Loops | Range() function | |
Nested Loop / Definite Iteration / For loop / While loop / Iteration / Loop / Counter / Increment / Decrement / Control flow / |
4.2.1.4. Indefinite Iteration |
Indefinite Iteration (While loops) |
Indefinite Loops (Infinite Loops) | Break Statement | Continue Statement | |
Indefinite Iteration / Loop / While loop / Do-while loop / For loop / Break statement / Continue statement / Infinite loop / Conditional loop / Control flow / |
4.2.1.5. Arithmetic Operators in Python |
Arithmetic Operators in Python |
Standard Arithmetic Operators ( + - * / ) | Modulo (%) | Floor division | Exponentiation (**) | |
Arithmetic Operators / Addition Operator / Subtraction Operator / Multiplication Operator / |
4.2.1.7. Logical Operators in Python |
Logical Operators |
AND Operator | OR Operator | NOT Operator | Order of Precedence | |
Logical Operators / AND / OR / NOT / XOR / |
4.2.1.5. Comparison Operators in Python |
Comparison Operators |
Comparison Operators in Python | Equal to (==) | Not equal to (!=) | Greater than (>) | Greater than or equal to (>=) | Less than (<) | Less than or equal to (<=) | |
Comparison Operators / == / != / > / < / >= / <= / in / not in / is / |
Subunit 2 - Error Handling & Validation |
4.2.2.1. Error Types |
Error Types |
Syntax Errors | Runtime errors | Logical Errors | |
Syntax Error / Runtime Error / Logic Error / Type Error / Null Pointer Exception / Arithmetic Error / Index Out of Bounds / File Not Found / Overflow Error / Underflow Error / IndentationError / NameError / TypeError / ValueError / IndexError / KeyError / FileNotFoundError / ZeroDivisionError / |
4.2.2.2. Types of Testing |
Introduction to Types of Testing |
Black Box Testing (Types of Testing) | White Box Testing (Types of Testing) | Grey Box Testing (Types of Testing) | |
Alpha Testing / Beta Testing / Unit Testing / Integration Testing / System Testing / Regression Testing / Performance Testing / Security Testing / Usability Testing / Acceptance Testing / |
4.2.2.3. Test Plans & Test Data |
Test Plans & Test Data |
Software Testing | Test Plan Components | Testing Table - Example | Normal, Abnormal, and Boundary Data | |
Testing / Test Plans / Test Data / Test Case / Test Scenario / Test Suite / Test Execution / Test Coverage / Boundary Testing / Equivalence Partitioning / Regression Testing / |
4.2.2.4. Debugging Techniques |
Code Analysis (Debugging Techniques) |
Code Analysis (Debugging Techniques) | IDE Debugging Features | |
Debugging / Breakpoint / Stepping / Variable Watch / Stack Trace / Logging / Assertion / Memory Dump / Code Review / Tracing / Binary Search / |
4.2.2.5. Trace Tables |
Trace Tables |
Introduction to Trace Tables | Trace table example | |
Trace Tables / Variable / Expression / Statement / Value / Initial value / Final value / Iteration / Condition / Boolean expression / Logical operator / Relational operator / Concatenation / Debugging / Syntax error / Logic error / Runtime error / Function / Recursion / |
4.2.2.6. Verification & Validation |
Introduction to Verification & Validation |
Input Verification | Duplicate Entry | Checksum Verification | Luhn Algorithm | Input Validation | Benefits of Input Validation | Presence Check | Length Check | Range Check | Format Check | |
range check / presence check / format check / length check / syntax check / boundary check / entry verification / validation / luhn / isbn / barcode / checksum / data validation / checksum validation / verification process / barcode scanner / Uniqueness check / Pattern check / Type check / Data integrity / Schema validation / |
Subunit 3 - Data Types |
4.2.3.1. Strings |
Strings |
What is a String? | Python String Concatenation | String Indexing | String Slicing | String Methods | String Formatting | |
String / Concatenation / Index / Substring / Length / Escape Sequence / Immutable / Comparing / String Methods / Case Sensitivity / |
4.2.3.2. Integer |
Integers |
Integers | Python integer operations | Converting between Integers and Strings | |
Integer / Positive Integer / Negative Integer / Zero / Prime Integer / Integer Division / Integer Overflow / |
4.2.3.3. Float data type |
Floats |
Floating point numbers | Type Conversion Involving Floats | Floating Point Rounding Errors | |
Float data type / Floating-point precision / Floating-point number / Decimal numbers / Floating-point arithmetic / Floating-point exception / Floating-point constant / Overflow / Underflow / Double-precision floating-point / |
4.2.3.4. Boolean |
Booleans |
Introduction to Boolean Data Type | Use Cases of Booleans | |
Boolean / True / False / Logic / Boolean Operator / AND Operator / OR Operator / NOT Operator / Truth Table / Boolean Algebra / |
Subunit 4 - Data Structures |
4.2.4.1. 1 Dimensional Arrays |
One dimensional arrays |
Introduction to One-Dimensional Arrays | Looping through arrays | Searching Arrays | Adding Items to a List | Removing Items from a List | |
Array / Elements / Index / Array Size / Initialization / Access / Traversal / Search / Insertion / Deletion / Element / Traverse / Update / Sort / |
4.2.4.2. 2 Dimensional Arrays |
Two dimensional arrays |
Introduction to Two Dimensional Arrays | |
2D Array / Rows / Columns / Elements / Index / Initialization / Access / Traversal / Array Length / Nested Arrays / Element / Row / Column / Array Size / Modification / |
4.2.4.3. Dictionaries |
Python Dictionaries |
Introduction to Dictionaries | Telephone Numbers and Emails | Dictionaries & Hast Tables | |
Dictionary / Key / Value / Mutable / Immutable / Length / Update / Keys / Values / Clear / Pop / Nested Dictionary / Hash Table / Dictionary Methods / Items / Get / In / Copy / Dictionary Comprehension / |
4.2.4.5. Records data structure |
Introduction to Records data structure |
Records data structure | |
Records data structure / Record / Field / Attribute / Key / Value / Index / Linked list / Array / Binary tree / |
Subunit 5 - Advanced Topics |
4.2.5.1. Functions & Procedures |
Introduction to Functions & Procedures |
Introduction to Functions | Introduction to Procedures | Local Variables | Global Variables | Variable Scope | |
Optional & Required Parameters |
Optional Parameters | Required Parameters | Parameters vs Arguments | |
Procedure / Parameter / Return Value / Local Variable / Global Variable / Recursion / function / argument / call / modularization / Function scope / Block scope / scope / Subprogram / Return statement / |
4.2.5.2. Strings Methods & String Manipulation |
Strings Methods & String Manipulation |
len() | upper(), lower() and title() | replace() | split() | Searching and Extracting Substrings | String slicing [stard:end] | Negative Slicing | .join() | |
Strings Methods / String Manipulation / Concatenation / Substring / Length / Indexing / Case Conversion / Replacing / Splitting / Trimming / String slicing / Start index / End index / Step value / Positive index / Negative index / |
Unit 9. Option A - Databases (Option A) |
Subunit 1 - Databases Fundamentals |
9. Option A.1.1. Introduction to databases |
Databases & Information Systems |
Data | Information | Databases | Information Systems | |
Types of Database |
Non-Electronic Databases | Flat File Databases | Relational Databases | NoSQL Databases | Object-Oriented Databases | Graph Databases | Time-Series Databases | Spatial Databases | In-Memory Databases | Distributed Databases | |
Database / Information Systems / Relational Database / SQL / Database Management System (DBMS) / Data / Information / Value / Accuracy / Relevance / Interpretation / Knowledge / Data Quality / Data Processing / Decision Making / Object-Oriented Database / Graph Database / Time-Series Database / Distributed Database / NoSQL Database / Flat file database / Record / Field / Delimiter / spatial database / in-memory database / replication / data partitioning / |
9. Option A.1.2. Database Transactions |
Database Transactions |
Database Transactions | Database Transaction Process | ACID Approach | Atomicity | Atomicity Example: Bank Transfer | Consistency | Consistency Example: Negative Bank Balance | Isolation | Transaction Isolation Example | Durability | Database Durability Example | |
Database Transaction Terminology |
Transaction | Commit | Rollback | Savepoint | Concurrency Control | Isolation Levels | Deadlock | Transaction Scheduling | Timestamp Ordering | |
ACID approach / Transaction / Atomicity / Consistency / Isolation / Durability / Concurrency / Redo Log / Undo Log / Locking / transaction log / audit trail / log file / recovery / logging / point-in-time recovery / undo operation / redo operation / database transactions / commit / rollback / isolation level / deadlock / concurrency control / Savepoint / Serializability / transaction scheduling / timestamp ordering / serialization / two-phase locking / Operation / Query / Record / |
9. Option A.1.3. Relational Databases |
Relational Databases |
Introduction to Relational Databases | Tables (Relations) | Rows (Tuples) | Columns (Attributes) | Primary Key | Foreign Key | Relationships | Junction Tables | Normalization | Advantages of Relational Databases | Disadvantages of Relational Databases | |
Relational Databases / Tables / Primary Key / Foreign Key / Normalization / SQL / Indexes / Transactions / ACID properties / Join / Junction Table / Many-to-Many Relationship / Composite Key / One to One / One to Many / Many to Many / Entity / Database Schema / |
9. Option A.1.4. Database Management Systems |
Introduction to Database Management Systems |
Introduction to Database Management Systems | Database Storage Engine | Data Dictionary | DBMS UI | Types of DBMS Reports | DBMS Backup Features | DBMS Security Features | |
Database Management Systems / Relational Database / SQL / Normalization / Index / Backup / Query / Transaction / Data Warehousing / Database Administrator / Database storage engine / SQLite / database security / query optimization / indexing / data redundancy / data integrity / |
9. Option A.1.6. Verification & Validation |
Introduction to Verification & Validation |
Input Verification | Duplicate Entry | Checksum Verification | Luhn Algorithm | Input Validation | Benefits of Input Validation | Presence Check | Length Check | Range Check | Format Check | |
range check / presence check / format check / length check / syntax check / boundary check / entry verification / validation / luhn / isbn / barcode / checksum / data validation / checksum validation / verification process / barcode scanner / Uniqueness check / Pattern check / Type check / Data integrity / Schema validation / |
9. Option A.1.5. Data Integrity |
Data Integrity |
Data Integrity within Databases | Entity Integrity | Domain Integrity | Referential Integrity | Orphaned Records | Cascade Delete | Redundant Data | |
Entity Integrity / Referential Integrity / Domain Integrity / Orphaned Record / Cascade Delete / data integrity / data anomaly / integrity constraint / data validation / |
9. Option A.1.8. Database Administrator |
Database Administrator |
Database Administrator role | Database Design and Modeling | Installation and Maintenance | Performance Tuning | Security | Backup and Recovery | Updates and Migrations | Troubleshooting | |
Database Administrator / Database Management System / Data Backup / Data Recovery / Database Security / Database Performance Tuning / SQL / Data Migration / Database Design / Data Integrity / |
9. Option A.1.10. Methods of database interaction |
Methods of database interaction |
SQL (Structured Query Language) | QBE (Query By Example) | Visual Queries | Natural Language Interfaces | |
SQL / Relational Database / Query / Data Manipulation / Database Schema / QBE / Graphical User Interface / Non-technical Users / Visual query systems / Drag-and-drop interface / Natural Language Interfaces / |
9. Option A.1.4. Entity Relationship Diagrams |
Types of Entity Relationship Diagram |
Introduction to Entity Relationship Diagrams. | Types of Entity Relationship Diagrams | Conceptual ERD (CERD) | Example Conceptual Entity Relationship Diagram | Logical Entity Relationship Diagrams | Example Logical Entity Relationship Diagram | Physical Entity Relationship Diagrams | Example Physical Entity Relationship Diagram | |
Entity / Relationship / Attribute / Cardinality / Associative Entity / Junction table / Many-to-many relationship / Entity Relationship Diagram (ERD) / Conceptual ERD / Logical ERD / Physical ERD / Primary Key / Foreign Key / |
9. Option A.1.8. 1st, 2nd & 3rd Normal Form |
1st, 2nd & 3rd Normal Form |
Database normalization | First Normal Form (1NF) | 1NF Example | Summary 1NF Example | 1NF and First / Last Names | Second Normal Form - No partial dependency | 2NF Example: Before | 2NF Example: Result | 3NF (Third Normal Form) - No Transitive Dependencies | Example of Transitive Dependency | 3NF Result | |
1st Normal Form / 2nd Normal Form / 3rd Normal Form / Normalization / Primary Key / Atomic Values / Dependency / Data Redundancy / |
Subunit 2 - SQL Queries |
9. Option A.2.2. Database Manipulation Language |
Database Manipulation Language SQL Queries |
SQL Data Manipulation Language (DML) Queries | SELECT Query | UPDATE | INSERT | DELETE | Data Aggregation and Summarization | Joining and Relational Views | Filtering and Sorting | Conditional Logic | Creating Virtual Tables (Views) | |
Complex SQL Queries |
Derived Field | Derived Field Example | Parameter Query | Parameter Query Example | Boolean Operators | Boolean Operators Example | |
Derived field / Parameters / Parameterized query / Injection attacks / SQL injection / Parameter markers / Placeholder / Database View Query / Database / View / Query / Virtual Table / Data Retrieval / aggregate / join / filter / sort / conditional / subquery / group by / having / distinct / limit / |
9. Option A.2.1. Database Definition Language |
Database Definition Language Queries |
Data Definition Language (DDL) | CREATE | ALTER | DROP | DELETE | .TABLE | PRAGMA table_info | |
Database / Language / Database Definition Language / Schema / Column / Constraint / Primary Key / Foreign Key / SQL / DDL / Data Manipulation Language / CREATE TABLE / ALTER TABLE / DROP TABLE / TRUNCATE TABLE / ADD COLUMN / DROP COLUMN / RENAME TABLE / |