12.1A |
Artificial intelligence
12.4.3.1 describe spheres where artificial intelligence is applied: industry, education, medicine, gaming industry, society
|
Theory and Exercises 2023
"Artificial Intelligence"
Experiments
Quick, drown!
Artificial Intelligence Tutorial
|
12.1A |
Virtual and augmented reality
12.4.3.2 explain the purpose of virtual and augmented reality
|
Theory and Exercises 2023
"Virtual and augmented reality"
|
12.1B |
Declarative and imperative programming languages
12.5.1.1 compare declarative and imperative programming languages
|
Theory and Exercises 2020
"Declarative and imperative PL"
Programming paradigms
Declarative languages (Teach-ict.com)
|
12.1B |
Expert systems
12.5.1.2 create a simple expert system
|
Theory and Exercises 2020
"Expert systems"
Expert system
|
12.1B |
Expert system (Imperative language)
12.5.1.2 create a simple expert system
|
Theory and Exercises 2024
"Expert systems (Python)" |
12.1B |
Expert system (Declarative language)
12.5.1.2 create a simple expert system
|
Theory and Exercises 2021
"Expert system (Prolog)"
Learn Prolog Now!
|
12.1B |
Stages of compiler design
12.5.1.3 describe program compilation stages: lexical and syntactic analysis, code generation, and optimization
|
Theory and Exercises 2024
"Stages of compiler design"
|
12.1C |
Course work. Stage Testing. Types of test data
12.5.3.2 perform testing using normal data
12.5.3.3 perform testing using extreme data
12.5.3.4 perform testing using erroneous data
|
Theory and Exercises 2023
"Testing. Types of test data"
Theory and Exercises 2020
"Test plan"
|
12.1C |
Types of programming errors
12.5.3.1 describe execution errors at program startup
12.5.3.5 describe a syntax error in a program code
12.5.3.6 describe a logic error in a program code
|
Theory and Exercises 2024
"Types of programming errors"
|
|
|
|
12.2A |
Information security
Threats to computer system
12.1.3.2 analyze problems arising due to malware, physical risks
12.1.3.1 analyze ethical problems arising due to computer system cracking
|
Theory & Exercises 2023
"Physical risks"
Theory & Exercises 2021
"Malware"
Theory & Exercises 2021
"Computer viruses"
Theory & Exercises 2021
"Methods of cracking"
|
12.2A |
Data protection measures
12.1.2.1 describe protection measures for data and computer systems such as firewalls, encryption, biometrics
|
Theory & Exercises 2020
"Data protection measures"
Theory & Exercises 2020
"Firewalls"
Theory & Exercises 2020
"Biometrics"
Theory & Exercises 2020
"Encryption"
Theory & Exercises 2020
"Passwords"
|
12.2A |
12.1.2.2 use data protection measures such as data backup and disk mirroring |
Theory & Exercises 2020
"Backup and Disk mirroring" |
12.2A |
12.1.2.3 protect data from unauthorized access |
Theory & Exercises 2023
"Protect data from unauthorized access" |
12.2A |
Privacy policies
12.1.3.3 explain privacy policies
12.1.3.4 analyze problems arising due to disseminating and using information
|
Theory & Exercises 2023
"Privacy policies"
|
12.2A |
E-government
12.1.3.7 use E-gov resources
|
Theory & Exercises 2020
"E-government" |
12.2B |
Creating documentation
12.2.1.1 use a table of contents when documenting a project
12.2.1.2 use headers and footers when documenting a project
12.2.1.3 use tables when documenting a project
12.2.1.4 set page parameters when documenting a project
12.2.1.5 set page numbers when documenting a project
12.2.1.6 set indents and line spacing when documenting a project
|
|
12.2B |
Copyright & Plagiarism
12.1.3.5 check documents using antiplagiarism resources
12.1.3.6 name copyright protection rules
|
Theory & Exercises 2023
"Plagiarism & antiplagiarism resources"
Theory & Exercises 2020
"Copyright"
Theory & Exercises 2023
"Understanding Copyright Law"
|
12.2C |
Methods of system implementation
12.2.1.7 list system implementation methods
12.2.1.8 compare the advantages and disadvantages of system implementation methods
|
Theory & Exercises 2023
"Methods of implementation"
|
12.2C |
Project work. Installation. Implementation plan.
12.2.1.9 explain the importance of making a system implementation plan
12.2.1.10 make a system implementation plan
|
Theory & Exercises 2020
"New system installation"
|
12.2C |
Project work. Documentation |
Theory & Exercises 2020
"User manual" |
12.2С |
Project work. Evaluation |
Theory & Exercises 2020
"Evaluation"
|
|
|
|
12.3A |
Types of operating system (part II)
12.3.1.1 describe a real-time operating system
12.3.1.2 describe a network operating system
12.3.1.3 describe a batch processing operating system
|
Theory & Exercises 2024
"Types of the operating system"
"Types of operating system (part I)"
|
12.3A |
User interfaces
12.3.1.4 define the advantages and disadvantages of a graphical user interface (GUI)
12.3.1.5 define the advantages and disadvantages of a command-line interface (CLI)
12.3.1.6 define the advantages and disadvantages of natural-language and gesture-recognition user interfaces
|
Theory & Exercises 2024
"Types of user interfaces"
|
12.3A |
Fetch-Decode-Execute cycle
12.3.2.5 explain three operations in a fetch-execute cycle (fetch /decode /execute)
|
Theory & Exercises 2022
"Fetch-Execute cycle"
Fetch/Execute Cycle (e-book)
Fetch-Execute cycle on teach-ict.com
|
12.3A |
System bus
12.3.2.4 explain how data is transferred between different components of a computer system through the address bus, data bus, and control bus
|
Theory & Exercises 2021
"System bus"
|
12.3A |
Speed clock, word size, bus width
12.3.2.6 explain how the clock speed, word length, and bus width affect the performance
|
Theory & Exercises 2021
"Computer performance"
|
12.3A |
RISC vs CISC
12.3.2.1 describe the RISC architecture
12.3.2.2 describe the CISC architecture
12.3.2.3 compare RISC and CISC
|
Theory & Exercises 2022
"RISC & CISC architecture" |
12.3A |
Addressable memory
12.3.4.1 explain the principle of memory addressing
12.3.4.2 explain the principle of storing programs and data
|
Theory & Exercises 2021
"Addressing modes"
Addressing modes (e-book)
|
12.3A |
Memory management. Paging and segmentation.
12.3.4.2 explain the principle of memory organization by segment and page
|
Theory & Exercises 2022
"Paging and segmentation"
|
12.3A |
Virtual machine
12.3.4.3 explain the concept of a virtual machine
|
Theory & Exercises 2021
"Virtual machine"
|
12.3A |
Boolean logic
12.3.3.2 build logical structures
12.3.3.4 analyze logical structures
|
Theory and Exercises 2022
"Boolean logic. Logic gates. Truth tables"
Build logic circuits online Logic.ly
|
12.3A |
Logic laws
12.3.3.3 simplify logical expressions using the laws of logic
|
Theory and Exercises 2022
"Simplification logic expressions"
|
12.3B |
Number systems. Represent positive decimal numbers in binary.
12.1.1.1 convert a number from one number system to another;
12.1.1.2 explain the advantages of using hexadecimal numbers in computer systems
|
Theory and Exercises 2021
"Binary, hexadecimal, and other number systems"
Why do we use hexadecimal?
|
12.3B |
Binary addition and binary multiplication
12.1.1.3 perform the arithmetic operations: addition and multiplication of binary numbers
|
Theory and Exercises 2021
"Binary addition and binary multiplication"
Binary addition examples
|
12.3B |
Represent positive and negative numbers in two's complement
12.1.1.4 represents positive and negative numbers in two's complement and specifies the range of n bits.
12.1.1.5 perform subtraction using two's complement
|
Theory and Exercises 2021
"Represent positive and negative numbers in two's complement"
|
12.3B |
Fixed point numbers and Floating point numbers
12.1.1.6 use binary numbers with a fixed point to represent fractional numbers with a given number of bits
12.1.1.7 represent positive and negative floating-point decimal numbers in binary.
|
Theory and Exercises 2021
"Fix point numbers and Floating point numbers" |
12.3B |
Data structures. Queues & Stacks.
12.5.2.1 describe the operation of stack and queue data structures
|
Theory and Exercises 2024
"Queue & Stack"
Visualization "Queue"
Visualization "Stack"
|
12.3B |
Data structures. Binary tree.
12.5.2.2 build a binary tree
|
Theory and Exercises 2020
"Binary tree"
Trees.pdf
|
12.3C |
Internet, WWW, intranet
12.6.2.1 distinguish features of the Internet, the World Wide Web, and the Intranet
|
Theory and Exercises 2021
"Internet, intranet, WWW" |
12.3C |
OSI model
12.6.1.2 describe the functions of the OSI network model levels
|
Theory and Exercises 2021
"OSI model"
|
12.3C |
Packet switching & circuit switching
12.6.1.1 explain the difference between packet switching and circuit switching
|
Theory and Exercises 2021
"Packet switching vs. Circuit switching"
|
12.3C |
MAC address
12.6.2.2 describe the role of MAC addresses in packet routing
12.6.2.3 identify the MAC address of a computer
|
Theory and Exercises 2021
"MAC address"
|