TOP

 

 

Semester One - Weeks 1, 2-3, 4-5, 6-8910-14

Semester Two - Weeks 1, 2-3, 4-6, 7-11, 12-1314

Source: SCSA 

Semester 1

to top

SEMESTER 1 - WEEK 1

to top

 

Introduction
Overview
Assessment requirements

KNOWLEDGE – SYSTEMS ANALYSIS AND DEVELOPMENT

Concept of project management, including:

  • planning
  • scheduling
  • budgeting
  • tracking

Types of system development methodologies

  • prototyping
  • system development life cycle (SDLC) 

to top

SEMESTER 1 - WEEKS 2-3

to top

KNOWLEDGE – SYSTEMS ANALYSIS AND DEVELOPMENT

Stages of the SDLC

  • preliminary analysis
  • analysis
  • design
  • development
  • implementation
  • evaluation and maintenance


Systems development documentation as a part of the SDLC

  • context diagrams using Yourdon/DeMarco notation
  • data flow diagrams (DFD) using Yourdon/DeMarco notation

SKILLS – SYSTEMS ANALYSIS AND DEVELOPMENT

Analyse context diagrams and data flow diagrams
Apply context and data flow diagrams using Yourdon/DeMarco notation, as a part of the SDLC

  • create context diagrams
  • create Level 0 DFD’s (maximum four processes), applying correct symbols and rules and defining system boundaries

to top

SEMESTER 1 - WEEKS 4-5

to top

KNOWLEDGE - SYSTEMS ANALYSIS AND DEVELOPMENT

Types of primary and secondary storage, including:

  • random access memory (RAM)
  • read only memory (ROM)
  • cache
  • mechanical disk
  • solid state drive (SSD)


Concept of boot process (power up to OS booting, including POST)
Storage capacities, including:

  • bit
  • byte
  • kilobyte
  • megabyte
  • gigabyte
  • terabyte


Hardware and software components for a computer system designed for a specific purpose, including:

  • input
  • output
  • processing
  • storage (primary and secondary)


Role of standard operating environment (SOE)


Role of components in the central processing unit (CPU)

  • arithmetic logic unit (ALU)
  • control unit (CU)
  • registers
  • program counter
  • system clock
  • data, address and control bus


Concept of the fetch-execute cycle


Troubleshooting strategies, including:

  • diagnosis of fault
  • implement a solution
  • document troubleshooting procedure

 

Appropriate physical preventative maintenance measures (see Troubleshooting Strategies)
Purpose of an ICT code of conduct
Ethics in the development and use of ICT systems
Privacy considerations in the development and use of ICT systems
Digital communications etiquette when using ICT systems 

 

to top

SEMESTER 1 - WEEKS 6-8

to top

KNOWLEDGE - MANAGING DATA

Spreadsheet terms, including:

 

SKILLS - MANAGING DATA

Create solutions using a spreadsheet application using:

  • functions (practice these)
  • charts (practice these)
  • lookup table (practice this)
  • sorting (practice this)

to top

SEMESTER 1 - WEEK 9

KNOWLEDGE - MANAGING DATA

Hierarchical structure of data

  • character/byte
  • field/attribute
  • record/tuple
  • table/entity/relation


Data protection methods, including:

  • encryption
    • private key
    • public key
  • authentication
    • passwords
    • biometrics
    • digital signature

 

to top

SEMESTER 1 - WEEKS 10-14

KNOWLEDGE - MANAGING DATA

Data types, including:

  • number
  • date/time
  • currency
  • text (string)
  • Boolean (true/false)


Database terms


Ethical and legal issues relating to the personal use and storage of data


Legal requirement and implication of information kept by various organisations about individuals


Design considerations for visual interfaces and navigation systems within database systems


Purpose of database documentation for the user

 

SKILLS - MANAGING DATA

Resolve simple many to many (M:N) relationship in a multi-table relational database system (maximum three entities)


Create using Chen’s notation entity relationship (ER) diagrams for a simple database solution (maximum three entities)
Data modelling using Chen’s notation entity relationships diagrams  (LOTS OF PRACTICE HERE)


Create a working relational multi-table database using:

  • data types
  • relations
  • primary and foreign keys
  • relationships
  • cardinality (1:1, 1:M, M:1, M:N)
  • validation rules
  • forms
  • reports
  • queries


Create a visual interface for a database


Create database documentation

to top

Semester 2

to top

SEMESTER 2 - WEEK 1

to top

Introduction and overview
Assessment requirements

KNOWLEDGE - DEVELOPING SOFTWARE

Evolution of programming languages

  • machine
  • assembler
  • procedural
  • non-procedural
  • object-oriented


Purpose and function of software to operate a computer system

  • operating systems
  • utility software
    • file compression
    • defragmenter
    • anti-virus
    • anti-malware
  • application software


Requirements for software licensing, including:

  • freeware
  • open source
  • shareware

 

to top

SEMESTER 2 - WEEKS 2-3

to top

KNOWLEDGE - DEVELOPING SOFTWARE

Stages of the software development cycle (SDC)

  • state the problem
  • plan and design
  • develop
  • test
  • evaluate


Factors affecting the development of software, including:

  • user needs
  • user interface 

SKILLS - DEVELOPING SOFTWARE

Create a system solution using the SDC
Apply software development requirements

to top

SEMESTER 2 - WEEKS 4-6

to top

KNOWLEDGE - PROGRAMMING

Characteristics of data types

  • integer
  • real (floating point number)
  • Boolean
  • character


Appropriate naming conventions for variables


Types of code, including:

  • source
  • executable


Types of control structures, including:

  • sequence
  • selection
  • one-way (if then)
  • two-way (if then else)
  • multi-way (case, nested if)
  • iteration
  • test first (while)
  • test last (repeat until)
  • fixed (for)


Types of program or code errors, including:


syntax errors
run-time errors
logical errors


Modelling of an algorithm using trace tables to test for logic


Purpose of internal and external documentation


Modelling of an algorithm using flow charts

SKILLS - PROGRAMMING

Create flow charts to represent a programming solution


Use pseudocode to represent a programming solution

to top

SEMESTER 2 - WEEKS 7-11

to top

SKILLS - PROGRAMMING

Apply, using pseudocode and a programming language, the following programming concepts:

constants
variables


Apply, using pseudocode and a programming language, the following control structures:


sequence
selection
one-way (if then)
two-way (if then else)
multi-way (case, nested if)
iteration
test first (while)
test last (repeat until)
fixed (for)


Apply, using pseudocode and a programming language, the following techniques:


develop internal and external documentation
select and apply suitable test data for checking the solution
use trace tables to test for and debug logic errors


Apply the SDC to create digital solutions


Use of the following number systems within a computer


binary
decimal
hexadecimal

to top

SEMESTER 2 - WEEKS 12-13

to top

KNOWLEDGE - NETWORKS AND COMMUNICATIONS
Functions of the following computer hardware components required for industry networks;

Good ref Here 1

Good ref Here 2

  • router
  • switch
  • firewall
  • modem
  • network interface card (NIC)
  • wireless access point (WAP)
  • bridge

Types of communication networks

  • Personal Area Network (PAN)
  • Local Area Network (LAN)
  • Wide Area Network (WAN)
  • Worldwide Interoperability for Microwave Access (WiMAX)
  • wireless (PAN, LAN, WAN)

Technologies appropriate for the implementation of a client/server and peer to peer network


Star topology network

Diagrammatic representation of network topologies for LAN and WAN

Characteristics of transmission media, including;

  • twisted pair (unshielded twisted pair [UTP] and shielded twisted pair [STP]
  • fibre optic
  • satellite
  • microwave
  • cellular
  • wireless

SKILLS - NETWORKS AND COMMUNICATIONS
Create network diagrams using CISCO network diagram conventions to represent network topologies for LAN and WAN

 

to top

SEMESTER 2 - WEEK 14

to top

KNOWLEDGE - NETWORKS AND COMMUNICATIONS

Communication terms


protocols
digital
analogue
ethernet
bandwidth


Types of communication protocols, including:


file transfer protocol (FTP)
hypertext transfer protocol (HTTP)
hypertext transfer protocol secure (HTTPS)
simple mail transfer protocol (SMTP)
wireless access protocol (WAP)


Methods used to ensure security of information over the internet, including:


authentication
encryption
firewalls


Types of malware, including:


viruses
worms
trojans
spyware



 Found an error or enhancement? Please use the contact form under the Home menu item.