Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 7

https://www.cambridgeinternational.org/Images/502962-2021-2023-syllabus.

pdf
INFORMATION REPRESENTATION
Data Representation
Binary Magnitudes and the Difference between Binary and Decimal Prefixes
Basic of Different Number System (Binary, Denary, Hexa, BCD, 1's and 2's Complement)
Perform Binary Addition and Subtraction (positive and negative binary integers)
Describe Practical Applications wher BCD and Hexa are used
ASCII code, Unicode
Multimedia
How data for a Bitmapped Image are encoded
Perform calculations to estimate the file size for a bitmap image
The effects of changing elements of a bitmap image on the image quality and file size
How data for a vector graphic are encoded
Justify the use of a bitmap image or a vector graphic for a given task
Sound
How sound is represented and encoded
The impact of changing the sampling rate and resolution
Compression
The need for and examples of the use of compression
Lossy and Lossless Compression and justify the use of a method in a given situation
How a text file, bitmap image, vector graphic and sould file can be compressed (Run-length encoding)

COMMUNICATION
Networks Including the Internet
The purpose and benefits of networking devices
The characteristics of a LAN and a WAN
The client-server and peer-to-peer models of networked computers
Thin-Client and Thick-Client
Bus, Star, Mesh, and Hybrid topologies
Cloud Computing
The diffrences and implications if the use of wireless and wired networks
The hardware that is used to support a LAN
The role and function of a router in a network
Ethernet and how collisions are detected and avoided
Bit Streaming
The difference between the WWW and the Internet
Describe the Hardware that is used to support the internet
Networks Including the Internet Continued
The use IP address in the transmission of data over the internet
How a URL is used to locate a resource on WWW and the role of DNS
HARDWARE
Computers and Their Components
Need for input, output, primary memory and secondary (including removable) storage
Embedded Systems
The principal operations of hardware devices
The use of buffers
The differences between RAM and ROM
The difference between SRAM and DRAM
The difference between PROM, EPROM, and EEPROM
Monitoring and Control Systems
Logic Gates and Logic Circuits
NOT, AND, OR, NAND, NOR, AND XOR Gates and Truth Tables
Construct a logic circuit
Construct a truth table
Construct a logic expression

PROCESSOR FUNDAMENTALS
Central Processing Unit (CPU) Architecture
Basic of Von Neumann Model for a computer system and the stored progra concept
The purpose and role of registers (general vs special purpose registers)
The purpose and roles of the ALU, CU, IAS
How data are transferred between various componenets of the computer syste (Address, Data, Control Bus
How factors contribute to the performance of the computer system
How different ports provide connection to peripheral devices
Describe the stages of the Fetch-Execute Cycle
The purpose of Interrupts
Assembly Language
The relationship between Assembly Language and Machine Code
The different stages of the assembly process for a two-pass assembler
Trace a given simple assembly language program
Set of Instructions are grouped
Modes of Addressing
Bit Manipulation
Binary Shifts
How bit manipulation can be used to monitor / control a device

SYSTEM SOFTWARE
Operating System
Why a computer system requires an OS
The key management tasks carried out by the OS
The need for typical utility software provided with an OS
Program libraries
Language Translators
Assembler Software for the translation of an assembly language program
Compiler for the translation of a high-level language program
Interpreter for translation and execution of a high-level language program
Benefits and Drawbacks of using either compiler or interpreter
Show awareness that high-level language programs may be partially compiled and particialy interpreted (Java)
Describe features found in a typical IDE

SECURITY, PRIVACY AND DATA INTEGRITY


Data Security
The difference between the terms security, privacy and integrity of data
The need for both the security pof data and the security of the computer system
Desribe Security measures designed to protect computer systems
The threats to computer and data security posed by networks and the internet
Describe methods that can be used to restrict the risks posed by threats
Describe Security methods designed to protect the secuity of data
Data Integrity
Describe how data validation and data verification help protect the integrity of data
Describe and use methods of data validatiom
Describe and use methods of data verification using data entry and data transfer

ETHICS AND OWNERSHIP


Ethics and Ownership
The need for and purpose of ethics as a computing professional
The need to act ethically and the impact of acting ethically or unethically for a given situation
The need for copyright legistaltion
The diffrence types of software licensing and justify the use of a license for a given situation
Show understanding of AI

DATABASES
Database Concepts
Show under setanding of the limitation of using a file-based approach for the storage and retrieval of data
Describe the features of a relational database that address the limitation of a file-based approach
She understanding of and use of terminology associated with a relational database model
Use an entity relationship (E-R) diagram to document a database design
Show understanding of the normalization process
Explain why a given set of database tables are, or are not, in 3NF
Produce a normalized database desig for a description of a database, a given set of data, or a given set of tables
Database Management System (DBMS)
Show understanding of the feature provided by a DBMS that address the issues of a file based approach
Show understanding of how software tools found within a DBMS are used in practice
Data Definition Language (DDL) and Data Manipulation Language (DML)
Show understanding the DBMS carries out all creation/modification of the database structure using its DDL
Show understanding that the DBMS carries out all queries and maintenance of data using its DML
Show understanding that the industry standard for both DDL and DML is Structured Query Language (SQL)
Understand given SQL (DDL) commands and be able to write simple SQL (DDL) commands using a sub-set of com
Write an SQL script to query or modify data (DML) which are stored in (at most two) database tables

ALGORITHM DESIGN AND PROBLEM SOLVING


Computational Thinking Skills
Show an understanding of abstraction (benefits, purpose, produce an abstract model)
Describe and use Decomposition (break down problems into sub-problems leading to the concept of a program mo
Algorithms
Show understanding that an algorithm is a solution to a problem expressed as a sequence of defined steps
Use suitable identifier names for the representation of data used by a problem and represent these using an identifi
Write a pseudo code that contains input, process and output
Write pseudo code using the 3 basic constructs of sequence, selection and iteration (repetition)
Document a simple algorithm using pseudecode
Write psedecode from a structured English description and a flowchart
Describe and use the process of stepwise refinement to express an algorithm to a level of detail from which the task
Use logic statements to define parts of an algorithm solution

DATA TYPES AND STRUCTURES


Data Types and Records
Select and use appropriate data types for a problem solution
Show understanding of the purpose of a record structure to hold a set of data of different data types under one iden
Arrays
Use the technical terms associated with arrays
Select a suitable data structure (1D or 2D Array) to use for a given task
Write pseudecode for 1D and 2D Arrays
Write pseudecode to process array data
Files
Show understanding of why files are needed
Write pseudecode to handle text files the consists of one or more lines
Introduction to Abstract Data Types (ADT)
Show understanding that an ADT is a collection of data and a set of operation in those data
Show understanding that a stack, queue and linked list are examples of ADTs
Use a stack, queue and linked list to store data
Describe how a queue, stack and lined list can be implemented using arrays

PROGRAMMING
Programming Basics
Implement and write pseudecode from a given design presented as either a program flowchart or structured English
Write pseudecode statements for the declaration of variables and constnats
Write pseudecode for the assignment of values to variables and constants
Write pseudecode statements for expressions involving any of the arithmetic or logical operators input from the key
Use built-in functions and library routines
Constructs
Use pseudecode to write an 'IF' statement including 'ELSE' clause and nested IF statements
Use pseudecode to write a 'CASE' structure
Use pseudecode to write a 'count controlled' loop
Use pseudecode to write a 'post-condition' loop
Use pseudecode to write a 'pre-condition' loop
Justify why one loop structure may be better suited yo solve a problem than the others
Structured Programming
Define and use a procedure
Explain where in the construction of an algorithm it would be appro[riate to use a procedure
Use parameters
Define and use a function
Explain where in th construction of an algorithm it is appropriate to use a functions
Write efficient pseudocode

SOFTWARE DEVELOPMENT
Program Development Life Cycle
Show understanding of the purpose of a development life cycle
Show understanding of the need for different development life cycles depending on the program being developed
Describe the principles, benefits, and drawbacks of each type of life cycle
Show understanding of the analysis, design, coding, testing and maintenance stages in the program development l
Program Design
Use a structure chart to decompose a problem into sub-tasks and express the parameters passed between th vario
Show understanding of the purpose of state-transition diagrams to document an algorithm
Program Testing and Maintenance
Show understanding of ways of exposing and avoiding faults in programs
Locate and identify the different types of errors
Correct identified errors
Show understanding of te methods of testing available and select appropriate data for a given method
Choose appropriate test data for a test plan
Show understanding of th need for continuing maintenance of a system and the difference between each type of m
Analyse an existing program and make amendments to enhance functionality
Kill meh

Peasent
Middle Class
BOW DOWN TO MEH HAHAHAHAH
are part of the algorithm design

You might also like