Standards in this Framework
Standard | Description |
---|---|
1.1.1 | Planning and system installation: Identify the context for which a new system is planned. |
1.1.2 | Planning and system installation: Describe the need for change management. |
1.1.3 | Planning and system installation: Outline compatibility issues resulting from situations including legacy systems or business mergers. |
1.1.4 | Planning and system installation: Compare the implementation of systems using a client’s hardware with hosting systems remotely. |
1.1.5 | Planning and system installation: Evaluate alternative installation processes. |
1.1.6 | Planning and system installation: Discuss problems that may arise as a part of data migration. |
1.1.7 | Planning and system installation: Suggest various types of testing. |
1.1.8 | User focus: Describe the importance of user documentation. |
1.1.9 | User focus: Evaluate different methods of providing user documentation. |
1.1.10 | User focus: Evaluate different methods of delivering user training. |
1.1.11 | System backup: Identify a range of causes of data loss. |
1.1.12 | System backup: Outline the consequences of data loss in a specified situation. |
1.1.13 | System backup: Describe a range of methods that can be used to prevent data loss. |
1.1.14 | Software deployment: Describe strategies for managing releases and updates. |
1.2.1 | Components of a computer system: Define the terms: hardware, software, peripheral, network, human resources. |
1.2.2 | Components of a computer system: Describe the roles that a computer can take in a networked world. |
1.2.3 | Components of a computer system: Discuss the social and ethical issues associated with a networked world. |
1.2.4 | System design and analysis: Identify the relevant stakeholders when planning a new system. |
1.2.5 | System design and analysis: Describe methods of obtaining requirements from stakeholders. |
1.2.6 | System design and analysis: Describe appropriate techniques for gathering the information needed to arrive at a workable solution. |
1.2.7 | System design and analysis: Construct suitable representations to illustrate system requirements. |
1.2.8 | System design and analysis: Describe the purpose of prototypes to demonstrate the proposed system to the client. |
1.2.9 | System design and analysis: Discuss the importance of iteration during the design process. |
1.2.10 | System design and analysis: Explain the possible consequences of failing to involve the end-user in the design process. |
1.2.11 | System design and analysis: Discuss the social and ethical issues associated with the introduction of new IT systems. |
1.2.12 | Human interaction with the system: Define the term usability. |
1.2.13 | Human interaction with the system: Identify a range of usability problems with commonly used digital devices. |
1.2.14 | Human interaction with the system: Identify methods that can be used to improve the accessibility of systems. |
1.2.15 | Human interaction with the system: Identify a range of usability problems that can occur in a system. |
1.2.16 | Human interaction with the system: Discuss the moral, ethical, social, economic and environmental implications of the interaction between humans and machines. |
2.1.1 | Computer architecture: Outline the architecture of the central processing unit (CPU) and the functions of the arithmetic logic unit (ALU) and the control unit (CU) and the registers within the CPU. |
2.1.2 | Computer architecture: Describe primary memory. |
2.1.3 | Computer architecture: Explain the use of cache memory. |
2.1.4 | Computer architecture: Explain the machine instruction cycle. |
2.1.5 | Secondary memory: Identify the need for persistent storage. |
2.1.6 | Operating systems and application systems: Describe the main functions of an operating system. |
2.1.7 | Operating systems and application systems: Outline the use of a range of application software. |
2.1.8 | Operating systems and application systems: Identify common features of applications. |
2.1.9 | Binary representation: Define the terms: bit, byte, binary, denary/decimal, hexadecimal. |
2.1.10 | Binary representation: Outline the way in which data is represented in the computer. |
2.1.11 | Simple logic gates: Define the Boolean operators: AND, OR, NOT, NAND, NOR and XOR. |
2.1.12 | Simple logic gates: Construct truth tables using the above operators. |
2.1.13 | Simple logic gates: Construct a logic diagram using AND, OR, NOT, NAND, NOR and XOR gates. |
3.1.1 | Network fundamentals: Identify different types of networks. |
3.1.2 | Network fundamentals: Outline the importance of standards in the construction of networks. |
3.1.3 | Network fundamentals: Describe how communication over networks is broken down into different layers. |
3.1.4 | Network fundamentals: Identify the technologies required to provide a VPN. |
3.1.5 | Network fundamentals: Evaluate the use of a VPN. |
3.1.6 | Data transmission: Define the terms: protocol, data packet. |
3.1.7 | Data transmission: Explain why protocols are necessary. |
3.1.8 | Data transmission: Explain why the speed of data transmission across a network can vary. |
3.1.9 | Data transmission: Explain why compression of data is often necessary when transmitting across a network. |
3.1.10 | Data transmission: Outline the characteristics of different transmission media. |
3.1.11 | Data transmission: Explain how data is transmitted by packet switching. |
3.1.12 | Wireless networking: Outline the advantages and disadvantages of wireless networks. |
3.1.13 | Describe the hardware and software components of a wireless network. |
3.1.14 | Describe the characteristics of wireless networks. |
3.1.15 | Describe the different methods of network security. |
3.1.16 | Evaluate the advantages and disadvantages of each method of network security. |
4.1.1 | Thinking procedurally: Identify the procedure appropriate to solving a problem. |
4.1.2 | Thinking procedurally: Evaluate whether the order in which activities are undertaken will result in the required outcome. |
4.1.3 | Thinking procedurally: Explain the role of sub-procedures in solving a problem. |
4.1.4 | Thinking logically: Identify when decision-making is required in a specified situation. |
4.1.5 | Thinking logically: Identify the decisions required for the solution to a specified problem. |
4.1.6 | Thinking logically: Identify the condition associated with a given decision in a specified problem. |
4.1.7 | Thinking logically: Explain the relationship between the decisions and conditions of a system. |
4.1.8 | Thinking logically: Deduce logical rules for real-world situations. |
4.1.9 | Thinking ahead: Identify the inputs and outputs required in a solution. |
4.1.10 | Thinking ahead: Identify pre-planning in a suggested problem and solution. |
4.1.11 | Thinking ahead: Explain the need for pre-conditions when executing an algorithm. |
4.1.12 | Thinking ahead: Outline the pre- and post-conditions to a specified problem. |
4.1.13 | Thinking ahead: Identify exceptions that need to be considered in a specified problem solution. |
4.1.14 | Thinking concurrently: Identify the parts of a solution that could be implemented concurrently |
4.1.15 | Thinking concurrently: Describe how concurrent processing can be used to solve a problem. |
4.1.16 | Thinking concurrently: Evaluate the decision to use concurrent processing in solving a problem. |
4.1.17 | Thinking abstractly: Identify examples of abstraction. |
4.1.18 | Thinking abstractly: Explain why abstraction is required in the derivation of computational solutions for a specified situation. |
4.1.19 | Thinking abstractly: Construct an abstraction from a specified situation. |
4.1.20 | Thinking abstractly: Distinguish between a real-world entity and its abstraction. |
4.2.1 | Describe the characteristics of standard algorithms on linear arrays. |
4.2.2 | Outline the standard operations of collections. |
4.2.3 | Discuss an algorithm to solve a specific problem. |
4.2.4 | Analyse an algorithm presented as a flow chart. |
4.2.5 | Analyse an algorithm presented as pseudocode. |
4.2.6 | Construct pseudocode to represent an algorithm. |
4.2.7 | Suggest suitable algorithms to solve a specific problem. |
4.2.8 | Deduce the efficiency of an algorithm in the context of its use. |
4.2.9 | Determine the number of times a step in an algorithm will be performed for given input data. |
4.3.1 | Nature of programming languages: State the fundamental operations of a computer. |
4.3.2 | Nature of programming languages: Distinguish between fundamental and compound operations of a computer. |
4.3.3 | Nature of programming languages: Explain the essential features of a computer language. |
4.3.4 | Nature of programming languages: Explain the need for higher level languages. |
4.3.5 | Nature of programming languages: Outline the need for a translation process from a higher level language to machine executable code. |
4.3.6 | Use of programming languages: Define the terms: variable, constant, operator, object. |
4.3.7 | Use of programming languages: Define the operators =, ≠, <, <=, >, >=, mod, div. |
4.3.8 | Use of programming languages: Analyse the use of variables, constants and operators in algorithms. |
4.3.9 | Use of programming languages: Construct algorithms using loops, branching. |
4.3.10 | Use of programming languages: Describe the characteristics and applications of a collection. |
4.3.11 | Use of programming languages: Construct algorithms using the access methods of a collection. |
4.3.12 | Use of programming languages: Discuss the need for sub-programmes and collections within programmed solutions. |
4.3.13 | Use of programming languages: Construct algorithms using predefined sub-programmes, onedimensional arrays and/or collections. |
5.1.1 | Thinking recursively: Identify a situation that requires the use of recursive thinking. |
5.1.2 | Thinking recursively: Identify recursive thinking in a specified problem solution. |
5.1.3 | Thinking recursively: Trace a recursive algorithm to express a solution to a problem. |
5.1.4 | Abstract data structures: Describe the characteristics of a twodimensional array. |
5.1.5 | Abstract data structures: Construct algorithms using twodimensional arrays. |
5.1.6 | Abstract data structures: Describe the characteristics and applications of a stack. |
5.1.7 | Abstract data structures: Construct algorithms using the access methods of a stack. |
5.1.8 | Abstract data structures: Describe the characteristics and applications of a queue. |
5.1.9 | Abstract data structures: Construct algorithms using the access methods of a queue. |
5.1.10 | Abstract data structures: Explain the use of arrays as static stacks and queues. |
5.1.11 | Linked lists: Describe the features and characteristics of a dynamic data structure. |
5.1.12 | Linked lists: Describe how linked lists operate logically. |
5.1.13 | Linked lists: Sketch linked lists (single, double and circular). |
5.1.14 | Trees: Define the terms: Describe how trees operate logically (both binary and non-binary). |
5.1.15 | Trees: Define the terms: parent, left-child, right-child, subtree, root and leaf. |
5.1.16 | Trees: State the result of inorder, postorder and preorder tree traversal. |
5.1.17 | Trees: Describe how trees operate logically (both binary and non-binary). |
5.1.18 | Applications: Define the term dynamic data structure. |
5.1.19 | Applications: Compare the use of static and dynamic data structures. |
5.1.20 | Applications: Suggest a suitable structure for a given situation. |
6.1.1 | System resources: Identify the resources that need to be managed within a computer system. |
6.1.2 | System resources: Evaluate the resources available in a variety of computer systems. |
6.1.3 | System resources: Identify the limitations of a range of resources in a specified computer system. |
6.1.4 | System resources: Describe the possible problems resulting from the limitations in the resources in a computer system. |
6.1.5 | Role of the operating system: Explain the role of the operating system in terms of managing memory, peripherals and hardware interfaces. |
6.1.7 | Role of the operating system: Outline OS resource management techniques: scheduling, policies, multitasking, virtual memory, paging, interrupt, polling. |
6.1.8 | Role of the operating system: Discuss the advantages of producing a dedicated operating system for a device. |
6.1.9 | Role of the operating system: Outline how an operating system hides the complexity of the hardware from users and applications. |
7.1.1 | Centralized control systems: Discuss a range of control systems. |
7.1.2 | Centralized control systems: Outline the uses of microprocessors and sensor input in control systems. |
7.1.3 | Centralized control systems: Evaluate different input devices for the collection of data in specified situations. |
7.1.4 | Centralized control systems: Explain the relationship between a sensor, the processor and an output transducer. |
7.1.5 | Centralized control systems: Describe the role of feedback in a control system. |
7.1.6 | Centralized control systems: Discuss the social impacts and ethical considerations associated with the use of embedded systems. |
7.1.7 | Distributed systems: Compare a centrally controlled system with a distributed system. |
7.1.8 | Distributed systems: Outline the role of autonomous agents acting within a larger system. |