12.1A |
Artificial intelligence
12.4.3.1 describe spheres where artificial intelligence is applied: industry, education, medicine, gaming industry, society
|
Theory and exercises 2020
"Artificial Intelligence"
|
AI applications
Experiments
Quick, drown!
The Development of Artificial Intelligence (on bbc.co.uk)
Artificial Intelligence Tutorial
За гранью. Искусственный интеллект (видео)
|
12.1A |
Virtual and augmented reality
12.4.3.2 explain the purpose of virtual and augmented reality
|
Theory and exercises 2020
"Virtual and augmented reality" |
Virtual Reality: another world within sight
The Ultimate Guide to Virtual Reality
What is augmented reality?
Pros vs Cons of Virtual Reality
|
12.1B |
Declarative and imperative programming languages
12.5.1.1 compare declarative and imperative programming languages
|
Theory and exercises 2020
"Declarative and imperative PL" |
Programming paradigms
Declarative languages
Declarative languages (Teach-ict.com)
Imperative languages (Procedural languages)
Classification of programming languages
|
12.1B |
Expert systems
12.5.1.2 create a simple expert system
|
Theory and exercises 2020
"Expert systems" |
Expert system |
12.1B |
Expert system (Imperative language)
12.5.1.2 create a simple expert system
|
Theory and exercises 2021
"Expert systems (Python)" |
|
12.1B |
Expert system (Declarative language)
12.5.1.2 create a simple expert system
|
Theory and exercises 2021
"Expert system (Prolog)" |
Learn Prolog Now! |
12.1B |
Stages of compiler design
12.5.1.3 describe program compilation stages: lexical and syntactic analysis, code generation, and optimization
|
Theory and exercises 2021
"Stages of compiler design"
|
Compiler Design - Phases of Compiler |
12.1C |
Course work. Stage Testing. Types of test data
12.5.3.2 perform testing using normal data
12.5.3.3 perform testing using extreme data
12.5.3.4 perform testing using erroneous data
|
Theory and exercises 2020
"Testing. Types of test data"
Theory and exercises 2020
"Test plan"
|
|
12.1C |
Types of programming errors
12.5.3.1 describe execution errors at program startup
12.5.3.5 describe a syntax error in a program code
12.5.3.6 describe a logic error in a program code
|
Theory and exercises 2020
"Types of programming errors"
|
|
|
|
|
|
12.2A |
Information security
Threats for computer system
12.1.3.2 analyze problems arising due to malware, physical risks
12.1.3.1 analyze ethical problems arising due to computer system cracking
|
Theory & tasks 2020
"Physical risks"
Theory & tasks 2021
"Malware"
Theory & tasks 2021
"Computer viruses"
Theory & tasks 2021
"Methods of cracking"
|
|
12.2A |
Data protection measures
12.1.2.1 describe protection measures data and computer systems such as firewalls, encryption, biometrics
12.1.2.3 protect data from unauthorized access
12.1.2.2 use data protection measures such as data backup and disk mirroring
|
Theory & tasks 2020
"Data protection measures"
Theory & tasks 2020
"Firewalls"
Theory & tasks 2020
"Biometrics"
Theory & tasks 2020
"Encryption"
Theory & tasks 2020
"Backup and Disk mirroring"
Theory & tasks 2020
"Passwords"
|
|
12.2A |
Privacy policies
12.1.3.3 explain privacy policies
12.1.3.4 analyze problems arising due to disseminating and using information
|
Theory & tasks 2020
"Privacy policies"
|
|
12.2A |
E-government
12.1.3.7 use E-gov resources
|
Theory & tasks 2020
"E-government" |
|
12.2B |
Creating documentation
12.2.1.1 use headers and footers when documenting a project
12.2.1.2 use footnotes when documenting a project
12.2.1.3 use tables when documenting a project
|
|
|
12.2B |
Copyright & plagiarism
12.1.3.5 check documents using antiplagiarism resources
12.1.3.6 name copyright protection rules
|
Theory & tasks 2020
"Plagiarism & antiplagiarism resources"
Theory & tasks 2020
"Copyright"
|
|
12.2C |
Methods of system implementation
12.2.1.7 list system implementation methods
12.2.1.8 compare the advantages and disadvantages of system implementation methods
|
Theory & tasks 2020
"Methods of implementation"
|
|
12.2C |
Project work. Installation. Implementation plan.
12.2.1.9 explain the importance of making a system implementation plan
12.2.1.10 make a system implementation plan
|
Theory & tasks 2020
"New system installation"
|
|
12.2C |
Project work. Documentation |
Theory & tasks 2020
"User manual" |
|
12.2С |
Project work. Evaluation |
Theory & tasks 2020
"Evaluation"
|
|
|
|
|
|
12.3A |
Types of operating system (part II)
12.3.1.1 describe a real-time operating system
12.3.1.2 describe a network operating system
12.3.1.3 describe a batch processing operating system
|
Theory & tasks 2022
"Types of the operating system"
"Types of operating system (part I)"
|
|
12.3A |
User interfaces
12.3.1.4 define the advantages and disadvantages of a graphical user interface (GUI)
12.3.1.5 define the advantages and disadvantages of a command-line interface (CLI)
12.3.1.6 define the advantages and disadvantages of natural-language and gesture-recognition user interfaces
|
Theory & tasks 2021
"Types of user interfaces" |
Wikibooks (User interfaces)
User interfaces (teach-ict.net)
User interfaces (bbc.com)
Interfaces (bbc.com)
|
12.3A |
Fetch-Decode-Execute cycle
12.3.2.5 explain three operations in fetch-execute cycle (fetch /decode /execute)
|
Theory & tasks 2022
"Fetch-Execute cycle"
|
Internal Elements of the CPU (e-book)
Fetch/Execute Cycle (e-book)
Fetch-Execute cycle on teach-ict.com
|
12.3A |
System bus
12.3.2.4 explain how data is transferred between different components of a computer system through the address bus, data bus, and control bus
|
Theory & tasks 2021
"System bus"
|
|
12.3A |
Speed clock, word size, bus width
12.3.2.6 explain how the clock speed, word length and bus width affect the performance
|
Theory & tasks 2021
"Computer performance"
|
|
12.3A |
RISC vs CISC
12.3.2.1 describe the RISC architecture
12.3.2.2 describe the CISC architecture
12.3.2.3 compare RISC and CISC
|
Theory & tasks 2022
"RISC & CISC architecture" |
|
12.3A |
Addressable memory
12.3.4.1 explain the principle of memory addressing
12.3.4.2 explain the principle of storing programs and data
|
Theory & tasks 2021
"Addressing modes"
Presentation for the lesson "Addressable memory"
|
Addressing modes (e-book) |
12.3A |
Memory management. Paging and segmentation.
12.3.4.2 explain the principle of memory organization by segment and page
|
Theory & tasks 2022
"Paging and segmentation" |
Paging and segmentation
Paging, segmentation, virtual memory
|
12.3A |
Virtual machine
12.3.4.3 explain the concept of virtual machine
|
Theory & tasks 2021
"Virtual machine"
|
|
12.3A |
Boolean logic
12.3.3.2 build logical structures
12.3.3.4 analyze logical structures
|
Theory and tasks 2020
"Boolean logic. Logic gates. Truth tables"
Build logic circuits online Logic.ly
|
|
12.3A |
Logic laws
12.3.3.3 simplify logical expressions using the laws of logic
|
Theory and tasks 2020
"Simplification logic expressions"
Presentation for the lesson "Karnaugh cards"
|
|
12.3B |
Represent positive decimal numbers in binary. Binary, hexadecimal numbers
12.1.1.1 convert binary numbers to hexadecimal
12.1.1.2 explain the advantages of using hexadecimal numbers in computer systems
|
Theory and tasks 2021
"Binary, hexadecimal numbers"
|
Why do we use hexadecimal? |
12.3B |
Binary addition and binary multiplication
12.1.1.3 perform the arithmetic operations: addition and multiplication of binary numbers
|
Theory and tasks 2021
"Binary addition and binary multiplication"
|
Binary addition examples
|
12.3B |
Represent positive and negative numbers in two's complement
12.1.1.4 represents positive and negative numbers in two's complement and specifies the range of n bits.
12.1.1.5 perform subtraction using two's complement
|
Theory and tasks 2021
"Represent positive and negative numbers in two's complement" |
Two's compliment binary addition examples |
12.3B |
Fixed point numbers and Floating point numbers
12.1.1.6 use binary numbers with a fixed point to represent fractional numbers with a given number of bits
12.1.1.7 represent positive and negative floating-point decimal numbers in binary.
|
Theory and tasks 2021
"Fix point numbers and Floating point numbers" |
|
12.3B |
Data structures. Queues & Stacks.
12.5.2.1 describe the operation of stack and queue data structures
|
Theory and tasks 2021
"Queue & Stack" |
Visualization "Queue"
Visualization "Stack"
|
12.3B |
Data structures. Binary tree.
12.5.2.2 build a binary tree
|
Theory and tasks 2020
"Binary tree"
Trees.pdf
|
|
12.3C |
Internet, WWW, intranet
12.6.2.1 distinguish features of the Internet, the World Wide Web, and the Intranet
|
Theory and tasks 2021
"Internet, intranet, WWW" |
|
12.3C |
OSI model
12.6.1.2 describe the functions of the OSI network model levels
|
Theory and tasks 2021
"OSI model"
|
|
12.3C |
Packet switching & circuit switching
12.6.1.1 explain the difference between packet switching and circuit switching
|
Theory and tasks 2021
"Packet switching vs Circuit switching"
|
|
12.3C |
MAC address
12.6.2.2 describe the role of MAC addresses in packet routing
12.6.2.3 identify the MAC address of a computer
|
Theory and tasks 2021
"MAC address"
|
|
|
|
|
|