We will discuss software (System software, application software, utility software), Operating system, features of the operating system, File management tool, security tools, Computer Simulation, and modeling.
we will discuss definitions of Programing language,
types of Programing language,
Low-Level Programming Language,
High-Level Programing Language,
machine code or machine language,
Assembly language,
Advantage & Disadvantages of assembly language,
Compiler & Interpreter,
Advantage & Disadvantages of Compiler & Interpreter.
We will learn the definition of network,
the purpose of using the network,
different types of network (LAN, WLAN, WAN,
Computer Network Models,
The processes of accessing a server for getting services,
Network Topologies (BUS, RING, Star, Mesh Topology)
Communication media,
Advantage and disadvantages of wired, wireless communication media,
Network data speed,
Definition of protocol and features of the protocol,
different types of protocol,
email protocols (SMTP, POP3, IMAP),
TCP protocol,
TCP/IP Protocol,
HTTP/ HTTPS
Internet protocol.
Network security,
The Importance of Network Security,
Firewall, The use of Firewall,
The security and advantages of cloud storage,
The Security and disadvantages of cloud storage,
NAS (network-attached storage),
Cyber-attack (Phishing, Shoulder Surfing, Unpatched software, USB devices, Eavesdropping),
Protecting against security weaknesses,
Security measures to protect from cyber-attacks,
Reviews of network and user policies.
We will learn Computing and the environment,
Advantage & Disadvantage of Computing to the environment,
Manufacture, Raw material extraction,
Production
Most hazardous materials used in the manufacture of computing technology,
Usages of Computing technology,
Disposal of Computing technology,
How computing technology preserving the environment.
We will learn Privacy, Personal Data,
UK Data Protection Act (1998)
Big data, How Big Data Works, The Uses of Big Data
Surveillance, Advantages of surveillance technology
location-based service (LBS), how do location-based services work,
Uses of location-based services
Privacy Enhancing Technologies (PET),
Privacy-enhancing tools
Cyber Security, The computer misuse act 1990
We will learn about Digital Inclusion,
Challenges for Digital Inclusion, Solutions,
Impact and Advantage of Digital Inclusion,
Moving Toward Digital Inclusion,
We will learn about, Intellectual property,
Copyright and patents,
The Copyright, Designs, and Patents Act (1988),
Licensing,
The terms of a Software license,
Creative Commons license,
Open-source and proprietary software
Advantage and disadvantages of open-source software
We will learn about the definition of Algorithm,
Criteria for a successful algorithm,
Relationship between algorithm & Program,
Flowcharts,
The algorithm, for making a cup of coffee,
Pseudo-code,
Algorithm for adding two numbers,
Arithmetic Operators,
Variables, Constants, Selection, Iteration,
Representation of selection & iteration in a flowchart,
Representation of selection & iteration in Pseudo-code,
Relational operator is an operator that compares two values,
Nested Selection,
Nested Selection pseudo-code,
Indefinite iteration, Definite iteration,
Logical Operators (AND, OR, NOT),
NESTED LOOPS,
Random Number