TOPICS COVERED
1.1 Hardware and Software
Hardware:
Physical components of a computer system.
Internal components: CPU, processor, motherboard.
Internal memory: RAM, ROM.
Hardware components: graphics card, sound card, NIC, camera, internal/external storage, input/output devices.
Software:
Programs for controlling operation or processing data.
Applications Software:
Provides user services for task solving.
Examples: word processing, spreadsheets, databases, control, measurement, applets/apps, video/graphics/audio editing, CAD.
System Software:
Provides services for computer operation.
Examples: compilers, linkers, device drivers, operating systems, utilities.
Analogue and Digital Data:
Characteristics of analogue and digital data.
Differences between analogue and digital data.
Need for conversion:
Analogue to digital for computer processing.
Digital to analogue for device control.
1.2 The Main Components of Computer Systems
Central Processing Unit (CPU):
Role in processing instructions for output.
Internal Memory:
Characteristics of ROM and RAM.
Differences between ROM and RAM.
Input and Output Devices:
Characteristics of input and output devices.
Differences between input and output devices.
Backing Storage:
Characteristics of backing storage.
Differences between backing storage and internal memory.
1.3 Operating Systems
Operating Systems:
Characteristics: CLI, GUI, dialogue-based, gesture-based interfaces.
Differences between operating system types.
Advantages and disadvantages of different operating systems.
1.4 Types of Computer
Desktop Computer:
Characteristics of a desktop computer.
Uses: office/business management, education, gaming, entertainment.
Mobile Computers:
Characteristics: laptops, smartphones, tablets, phablets.
Uses: office/business management, education, gaming, entertainment, remote control.
Advantages and disadvantages of mobile and desktop computers: portability and expandability.
1.5 Emerging Technologies
Impact of Emerging Technologies:
Impact on everyday life: AI, extended reality (virtual and augmented).
2.1 Input Devices and Their Uses
Characteristics, uses, advantages, and disadvantages of:
Keyboard, numeric keypad, pointing devices, remote control, joystick/driving wheel, touch screen (input), scanners, cameras, microphones, sensors, light pens.
2.2 Direct Data Entry and Associated Devices
Characteristics, uses, advantages, and disadvantages of:
Magnetic stripe readers, chip and PIN readers, RFID readers, OMR, OCR, bar code readers, QR scanners.
2.3 Output Devices and Their Uses
Characteristics, uses, advantages, and disadvantages of:
Monitors, touch screen (output), multimedia projectors, laser printers, inkjet printers, dot matrix printers, plotters, 3D printers, speakers, actuators.
Storage Devices:
Characteristics, uses, media, advantages, and disadvantages of:
Magnetic, optical, and solid-state storage.
Magnetic drives: fixed/portable hard drives, magnetic tape drives.
Optical drives: CD, DVD, Blu-ray.
Solid-state drives: SSD, pen drives, flash drives.
Storage Media:
Characteristics, uses, advantages, and disadvantages of:
Magnetic, optical, and solid-state media.
Magnetic media: hard disks, magnetic tape.
Optical discs: CD, DVD, Blu-ray.
Solid-state media: memory cards (SD, xD, CFast).
4.1 Networks
Router:
Operation and purpose: connecting networks/devices to the internet, storing addresses, routing packets.
Common Network Devices:
NICs, hubs, bridges, switches.
Wi-Fi and Bluetooth:
Uses of Wi-Fi and Bluetooth.
Connecting devices using Wi-Fi and Bluetooth.
Similarities and differences between Wi-Fi and Bluetooth.
Cloud Computing:
Characteristics, uses, and issues.
Data storage, management, and sharing.
Advantages and disadvantages compared to other storage methods.
Common Network Environments:
Characteristics, uses, and purpose of extranets, intranets, and the internet.
Differences and similarities.
Network Types:
LAN, WLAN, WAN, and their differences.
4.2 Network Issues and Communication
Security Issues Regarding Data Transfer:
Privacy and confidentiality.
Passwords:
Avoiding interception, strong vs. weak passwords.
Other Authentication Methods:
Zero login, biometrics, magnetic stripes, smart cards, physical/electronic tokens.
Anti-Malware Software:
Use of anti-malware and anti-virus software.
Virus removal/quarantine.
Scanning storage media and downloads.
Electronic Conferencing:
Characteristics, uses, advantages, and disadvantages of video, audio, and web conferencing.
Hardware, software, and network requirements.
5.1 Microprocessor-Controlled Devices
Effects of microprocessors/smart devices:
Home monitoring/control: impact on lifestyle, leisure, fitness, data security, social interaction.
Transport monitoring/control: data security, autonomous vehicles, transport safety.
5.2 Potential Health Problems Related to the Prolonged Use of IT Equipment
Health issues: RSI, back problems, eye problems, headaches.
Causes and prevention strategies.
6.1 Communication
Communication Media:
Characteristics and uses:
Newsletters
Posters
Websites
Multimedia presentations
Audio
Video
Media streaming
ePublications
Mobile Communication:
Use of mobile devices for communication:
SMS messaging
Phone calls
Voice over Internet Protocol (VoIP)
Video calls
Accessing the internet
6.2 Modelling Applications
Computer Modelling:
Examples:
Personal finance
Bridge and building design
Flood water management
Traffic management
Weather forecasting
Advantages and disadvantages of using computer modelling rather than humans.
6.3 Computer Controlled Systems
Computer Controlled Systems:
Examples:
Robotics in manufacture
Production line control
Autonomous vehicles
Advantages and disadvantages of using computer controlled systems rather than humans.
6.4 School Management Systems
Systems used to manage:
Learner registration and attendance
Learner performance recording (including computer-aided learning).
6.5 Booking Systems
Online Booking Systems:
Characteristics, uses, advantages, and disadvantages:
Travel industry
Concerts
Cinemas
Sporting events
6.6 Banking Applications
Banking Applications:
Automatic Teller Machines (ATM):
Characteristics, uses, advantages, and disadvantages:
Withdrawing cash
Depositing cash or cheques
Checking account balance
Mini statements
Bill paying
Money transfers
Electronic Funds Transfer (EFT), credit/debit card transactions, cheques, internet banking:
Characteristics, uses, advantages and disadvantages.
6.7 Computers in Medicine
Information Systems in Medicine:
Characteristics and uses:
Patient records
Pharmacy records
3D printers:
printing of prosthetics, tissue engineering, artificial blood vessels, customised medicines.
6.8 Expert Systems
Expert Systems:
Characteristics, uses, and purpose:
Mineral prospecting
Car engine fault diagnosis
Medical diagnosis
Chess games
Financial planning
Route scheduling for delivery vehicles
Plant and animal identification
Components:
User interface
Inference engine
Knowledge base
Rules base
Explanation system
How expert systems produce solutions.
6.9 Computers in the Retail Industry
Computers in the Retail Industry:
Point of sale (POS) terminals and electronic funds transfer at point of sale (EFTPOS) terminals:
Characteristics and uses.
POS terminals:
Automatic updating of stock files and ordering new stock.
EFTPOS terminals:
Checking card validity
Use of chip and PIN
Use of contactless cards
Use of Near Field Communication (NFC) payment
Communication between supermarket and bank computers.
Internet shopping:
Characteristics, advantages, and disadvantages.
6.10 Recognition Systems
Recognition Systems:
Characteristics, uses, advantages, and disadvantages:
Optical Mark Recognition (OMR):
School registers
Multiple-choice examination papers
Barcode and QR code.
Optical Character Recognition (OCR):
Automated number plate recognition (ANPR) systems.
Radio Frequency Identification Device (RFID):
Tracking stock, passports, automobiles, contactless payment.
Near Field Communication (NFC):
Payment using a smartphone.
Biometric recognition:
Face, iris, retina, finger, thumb, hand, voice.
6.11 Satellite Systems
Satellite Systems:
Characteristics, uses, advantages, and disadvantages:
Global Positioning Systems (GPS)
Satellite navigation
Geographic Information Systems (GIS)
Media communication systems (satellite television, satellite phone).
7.1 Analysis
Analysis of the Current System:
Characteristics, uses, advantages, and disadvantages of research methods:
Observation
Interviews
Questionnaires
Examination of existing documents
Record and analyze information about the current system.
Identify:
Inputs, outputs, and processing of the current system.
Problems with the current system.
User and information requirements for the new system.
System Specification:
Identify and justify suitable hardware and software for the new system.
7.2 Design
Design:
Design file/data structures, input formats, output formats, and validation routines.
File/data structures:
Field length.
Field name.
Data type.
Coding of data (e.g., M/F).
Validation routines:
Range check.
Character check.
Length check.
Type check.
Format check.
Presence check.
Check digit.
Input formats:
Data capture forms.
Output formats:
Screen layouts.
Report layouts.
7.3 Development and Testing
Testing:
The need to test the system before implementation.
Test designs, test strategies, test plan:
Test data.
Expected outcomes.
Actual outcomes.
Remedial action.
Test designs:
Testing data structures, file structures, input formats, output formats, and validation routines.
Test strategies:
Testing each module, each function, and the whole system.
Definition, characteristics, and use of test data:
Normal, abnormal, and extreme data.
The use of live data.
7.4 Implementation
System Implementation:
Characteristics, uses, advantages, and disadvantages of implementation methods:
Direct changeover.
Parallel running.
Pilot running.
Phased implementation.
7.5 Documentation
Documentation:
Characteristics, uses, and purpose of technical and user documentation.
Technical Documentation:
Purpose of the system/program.
Limitations of the system.
Program listing.
Program language.
Program flowcharts/algorithms.
System flowcharts.
Hardware and software requirements.
File structures.
List of variables.
Input format.
Output format.
Sample runs/test runs.
Validation routines.
User Documentation:
Purpose of the system.
Limitations of the system.
Hardware and software requirements.
How to load/run/install software.
How to save a file.
How to print data.
How to add records.
How to delete/edit records.
Input format.
Output format.
Sample runs.
Error messages.
Error handling.
Troubleshooting guide/helpline.
Frequently asked questions.
Glossary of terms.
7.6 Evaluation
Evaluate a Solution:
Evaluate:
Efficiency of the solution.
Ease of use of the solution.
Appropriateness of the solution.
Compare the solution with original task requirements.
Identify limitations and necessary improvements.
Evaluate user responses to test results.
8.1 Physical Safety
Safety Issues:
Electrocution (spills, live cables).
Fire (overloaded sockets, overheating).
Tripping (trailing cables).
Injuries (falling equipment).
Causes and prevention strategies.
8.2 eSafety
Data Protection:
Principles of data protection acts.
Need for data protection legislation.
Personal Data:
Characteristics of personal and sensitive data (name, address, date of birth, photos, medical history).
Need for confidentiality and protection.
eSafety:
Need for eSafety (internet, email, social media, gaming).
Minimizing dangers:
Internet:
Trusted websites.
Age-appropriate search engines.
Email:
Unknown senders.
Personal data/image risks.
Social media:
Blocking/reporting.
Meeting online contacts.
Inappropriate content.
Inappropriate language.
Confidentiality.
Online gaming:
Real names.
Personal/financial data.
8.3 Security of Data
Threats to Data:
Hacking (protective measures).
Phishing, pharming, smishing, vishing (prevention methods).
Viruses, malware (preventative actions).
Card fraud (shoulder surfing, cloning, key logging).
Protection of Data:
Biometrics (use of biometric data).
Digital certificates (purpose, contents).
Secure Socket Layer (SSL) (encrypted links).
Encryption (purpose for data protection).
Firewalls (purpose).
Two-factor authentication (purpose, function).
User ID and password (how they increase security).
9.1 Audience Appreciation:
Show a clear sense of audience and purpose.
Planning ICT solutions that are responsive to and respectful of the needs of an audience.
Analyze the needs of an audience when creating ICT solutions.
9.2 Copyright
Copyright:
The need for copyright legislation and the principles of copyright relating to computer software (e.g., software piracy).
The methods that software producers employ to prevent software copyright legislation being broken.
Communication with Other ICT Users Using Email
Email:
Characteristics, uses, and constraints:
Acceptable language.
Employer guidelines.
Security.
Netiquette.
Email groups.
Carbon copy (cc).
Blind carbon copy (bcc).
Forward.
Attachments.
Spam email:
Characteristics and effects.
Prevention methods.
10.2 Effective Use of the Internet
The Internet:
Characteristics, uses, advantages, and disadvantages:
Differences between the internet, intranet, extranet, and the World Wide Web (WWW).
Blog.
Forum.
Wiki.
Social networking.
Functionality:
Internet Service Provider (ISP).
Structure of a web address.
Uniform Resource Locator (URL).
Hyperlink.
Web browser.
Use of search engines:
Speed of searching.
Amount of information.
Speed of finding relevant information.
Ease of finding reliable information.
Evaluating information:
Up-to-date.
Reliable.
Biased.
Valid.
Internet protocols:
HyperText Transfer Protocol (HTTP).
HyperText Transfer Protocol secure variant (HTTPS).
File Transfer Protocol (FTP).
Secure Socket Layer (SSL).
Risks:
Inappropriate and criminal material.
Restricting data through parental, educational, and ISP control.
11.1 Manage Files Effectively
Candidates should be able to:
Locate stored files.
Open and import files of different types.
Save files in a planned hierarchical directory/folder structure.
Save files using appropriate file names.
Save and print files in a variety of formats:
Documents.
Screenshots.
Database reports.
Data tables.
Graphs/charts.
Web page (browser view).
Web page (HTML view).
Save and export in application package file formats:
.docx, .doc
.xlsx, .xls
.sdb, .sdc
.accdb, .odb
.rtf
.pptx, .ppt
Save and export in generic file formats:
.csv
.txt
.rtf
.css
.htm
.jpg
.png
Candidates should know and understand:
File formats:
Characteristics and uses of file formats:
.css
.csv
.gif
.htm
.jpg
.png
.rtf
.txt
.zip
.rar
The need for generic file formats.
11.2 Reduce File Sizes for Storage or Transmission
Candidates should be able to:
Compress files.
Reduce file sizes using file compression:
.zip
.rar
Candidates should know and understand:
File compression:
The need to reduce file sizes for storage or transmission.